From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200903-28.xml | 86 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 86 insertions(+) create mode 100644 metadata/glsa/glsa-200903-28.xml (limited to 'metadata/glsa/glsa-200903-28.xml') diff --git a/metadata/glsa/glsa-200903-28.xml b/metadata/glsa/glsa-200903-28.xml new file mode 100644 index 000000000000..8b34c3c22891 --- /dev/null +++ b/metadata/glsa/glsa-200903-28.xml @@ -0,0 +1,86 @@ + + + + libpng: Multiple vulnerabilities + + Multiple vulnerabilities were found in libpng, which might result in the + execution of arbitrary code + + libpng + 2009-03-15 + 2009-03-15: 01 + 244808 + 255231 + 259578 + remote + + + 1.2.35 + 1.2.35 + + + +

+ libpng is the official PNG reference library used to read, write and + manipulate PNG images. +

+
+ +

+ Multiple vulnerabilities were discovered in libpng: +

+
    +
  • A + memory leak bug was reported in png_handle_tEXt(), a function that is + used while reading PNG images (CVE-2008-6218).
  • +
  • A memory + overwrite bug was reported by Jon Foster in png_check_keyword(), caused + by writing overlong keywords to a PNG file (CVE-2008-5907).
  • +
  • A + memory corruption issue, caused by an incorrect handling of an out of + memory condition has been reported by Tavis Ormandy of the Google + Security Team. That vulnerability affects direct uses of + png_read_png(), pCAL chunk and 16-bit gamma table handling + (CVE-2009-0040).
  • +
+
+ +

+ A remote attacker may execute arbitrary code with the privileges of the + user opening a specially crafted PNG file by exploiting the erroneous + out-of-memory handling. An attacker may also exploit the + png_check_keyword() error to set arbitrary memory locations to 0, if + the application allows overlong, user-controlled keywords when writing + PNG files. The png_handle_tEXT() vulnerability may be exploited by an + attacker to potentially consume all memory on a users system when a + specially crafted PNG file is opened. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All libpng users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.35" +
+ + CVE-2008-5907 + CVE-2008-6218 + CVE-2009-0040 + + + craig + + + mabi + + + p-y + +
-- cgit v1.2.3