This bug was fixed in the package libpng - 1.2.50-1ubuntu2.14.04.1 --------------- libpng (1.2.50-1ubuntu2.14.04.1) trusty-security; urgency=medium
[ Andrew Starr-Bochicchio ] * SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE (LP: #1516592). - debian/patches/CVE-2015-8126.diff: Prevent writing over-length PLTE chunk and silently truncate over-length PLTE chunk while reading. Backported from upstream patch. - CVE-2015-8126 [ Marc Deslauriers ] * SECURITY UPDATE: out of bounds read in png_set_tIME - debian/patches/CVE-2015-7981.patch: check bounds in png.c and pngset.c. - CVE-2015-7981 -- Marc Deslauriers <marc.deslauri...@ubuntu.com> Thu, 19 Nov 2015 08:02:50 -0500 ** Changed in: libpng (Ubuntu Trusty) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-7981 ** Changed in: libpng (Ubuntu Wily) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1516592 Title: CVE-2015-8126: Multiple buffer overflows To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpng/+bug/1516592/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs