libpng-1.2.46-1.AXS4
エラータID: AXSA:2011-704:01
The libpng package contains a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. PNG is a bit-mapped graphics format similar to the GIF format. PNG was created to replace the GIF format, since GIF uses a patented data compression algorithm.
Libpng should be installed if you need to manipulate PNG format image files.
Security issues fixed with this release:
CVE-2011-2501
The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. NOTE: this vulnerability exists because of a CVE-2004-0421 regression.
CVE-2011-2690
Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
CVE-2011-2692
The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
Update packages.
The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
From Asianux Server 4 SP1.
SRPMS
- libpng-1.2.46-1.AXS4.src.rpm
MD5: 4bbbe02e676c55389b2c95e4be047536
SHA-256: 41ac4cf541d2610bec593b84132bbbc18a5354e527cb616819fe44862ef908d4
Size: 641.47 kB
Asianux Server 4 for x86
- libpng-1.2.46-1.AXS4.i686.rpm
MD5: 56aa61edfa69674418a07e5b1f39a7c9
SHA-256: 2c7648cef008116cd2cd1b2365cb2eee12fe6a1fad3f8bf11945438d435fb185
Size: 183.34 kB - libpng-devel-1.2.46-1.AXS4.i686.rpm
MD5: 8fc4ce857eb6fbda655b40904f314c06
SHA-256: 93d9acef296a68ef3103de755eba4afd60650df73c1f82888dd2df8aa905085e
Size: 111.10 kB
Asianux Server 4 for x86_64
- libpng-1.2.46-1.AXS4.x86_64.rpm
MD5: 8e4a2ff4120f65941432a696bc26c8d9
SHA-256: 5ff9015ec6732979d57533c86c481bfa473351f757234711c302b3251b2f33bb
Size: 179.51 kB - libpng-devel-1.2.46-1.AXS4.x86_64.rpm
MD5: 4c3f80ed5d96aaac9f91752c153fe80d
SHA-256: c066eb0bf670f047c25a8fd65df80cb4f8154efbad2c0e651986f4203fefcd01
Size: 110.66 kB - libpng-1.2.46-1.AXS4.i686.rpm
MD5: 56aa61edfa69674418a07e5b1f39a7c9
SHA-256: 2c7648cef008116cd2cd1b2365cb2eee12fe6a1fad3f8bf11945438d435fb185
Size: 183.34 kB - libpng-devel-1.2.46-1.AXS4.i686.rpm
MD5: 8fc4ce857eb6fbda655b40904f314c06
SHA-256: 93d9acef296a68ef3103de755eba4afd60650df73c1f82888dd2df8aa905085e
Size: 111.10 kB