Hide Forgot
An integer overflow leading to a heap-based buffer overflow was found in the png_set_sPLT() and png_set_text_2() API functions of libpng. A attacker could create a specially-crafated image file and render it with an application written to explicitly call png_set_sPLT() or png_set_text_2() function, could cause libpng to crash or execute arbitrary code with the permissions of the user running such an application. The vendor mentions that internal calls use safe values. These issues could potentially affect applications that use the libpng API. Apparently no such applications were identified. Reference: http://sourceforge.net/p/libpng/bugs/199/ http://seclists.org/oss-sec/2014/q2/83
This issue was addressed by the following upstream commits for libpng-1.6: http://sourceforge.net/p/libpng/code/ci/590c8b0987f192ae588f6d952bfff5b398c4cb8b http://sourceforge.net/p/libpng/code/ci/2414bd99d8c76f92ca9272f1b1b1eff55709298a/ This issue was addressed by the following upstream commits for libpng-1.5.14: http://sourceforge.net/p/libpng/code/ci/798d3de5f66b6df6d6605f968da641c24725b15e http://sourceforge.net/p/libpng/code/ci/77a0a2ea113e699c7021caf1a530d2e2dd90b497
Created libpng tracking bugs for this issue: Affects: fedora-19 [bug 1086669]
Created libpng10 tracking bugs for this issue: Affects: epel-6 [bug 1086673]
Created libpng15 tracking bugs for this issue: Affects: fedora-20 [bug 1086670]
Created mingw-libpng tracking bugs for this issue: Affects: fedora-19 [bug 1086671]
Created mingw32-libpng tracking bugs for this issue: Affects: epel-5 [bug 1086672] Affects: epel-6 [bug 1086674]
Upstream says libpng10, 12, and 14 were not affected. http://sourceforge.net/p/png-mng/mailman/message/32215052/
Statement: Not vulnerable. This issue does not affect the version of libpng as shipped with Red Hat Enterprise Linux 5 and 6.
Does this affect also libpng in Fedora 20 where is version 1.6.6?
This is already fixed in libpng-1.6.6 version. I have checked that against upstream.