Source: libpng
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for libpng.

Upstream's announcement:
> Several versions of libpng through 1.4.2 (and through 1.2.43 in the older
> series) contain a bug whereby progressive applications such as web
> browsers (or the rpng2 demo app included in libpng) could receive an extra
> row of image data beyond the height reported in the header, potentially
> leading to an out-of-bounds write to memory (depending on how the
> application is written) and the possibility of execution of an attacker's
> code with the privileges of the libpng user.

For which CVE-2010-1205 was assigned.

>  An additional memory-leak bug, involving images with malformed sCAL
>  chunks, is also present; it could lead to an application crash (denial of
>  service) when viewing such images.

CVE-2010-2249

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry. If possible, please provide packages for 
stable (to be released via the security archive.)
Thanks!

For further information see:
http://www.libpng.org/pub/png/libpng.html
https://bugzilla.redhat.com/CVE-2010-2249

Could you also please investigate the following and tell us what your plans 
are regarding it?
https://bugzilla.redhat.com/show_bug.cgi?id=608644#c10

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to