This bug was fixed in the package libpng - 1.2.46-3ubuntu4.1 --------------- libpng (1.2.46-3ubuntu4.1) precise-security; urgency=medium
[ Andrew Starr-Bochicchio ] * SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE (LP: #1516592). - debian/patches/CVE-2015-8126.diff: Prevent writing over-length PLTE chunk and silently truncate over-length PLTE chunk while reading. Backported from upstream patch. - CVE-2015-8126 [ Marc Deslauriers ] * SECURITY UPDATE: out of bounds read in png_set_tIME - debian/patches/CVE-2015-7981.patch: check bounds in png.c and pngset.c. - CVE-2015-7981 * SECURITY UPDATE: out of bounds read in png_push_read_zTXt - debian/patches/CVE-2012-3425.patch: check for truncated chunk in pngpread.c. - CVE-2012-3425 -- Marc Deslauriers <marc.deslauri...@ubuntu.com> Thu, 19 Nov 2015 08:05:59 -0500 ** Changed in: libpng (Ubuntu Precise) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-3425 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1516592 Title: CVE-2015-8126: Multiple buffer overflows To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpng/+bug/1516592/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs