ALT-PU-2019-1318-1
Closed vulnerabilities
BDU:2015-12011
Уязвимости библиотеки libpng, позволяющие нарушителю вызвать отказ в обслуживании
BDU:2015-12117
Уязвимость библиотеки libpng и операционных систем Ubuntu, Debian GNU/Linux, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2016-01652
Уязвимость библиотеки libpng, позволяющая нарушителю повлиять на целостность, доступность и конфиденциальность информации
BDU:2016-01664
Уязвимость библиотеки libpng, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00462
Уязвимость функции png_set_text_2 библиотеки libpng, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-7981
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
- FEDORA-2015-1d87313b7c
- FEDORA-2015-1d87313b7c
- FEDORA-2015-ec2ddd15d7
- FEDORA-2015-ec2ddd15d7
- FEDORA-2015-501493d853
- FEDORA-2015-501493d853
- openSUSE-SU-2015:2099
- openSUSE-SU-2015:2099
- openSUSE-SU-2015:2136
- openSUSE-SU-2015:2136
- RHSA-2015:2594
- RHSA-2015:2594
- RHSA-2015:2595
- RHSA-2015:2595
- http://sourceforge.net/p/libpng/bugs/241/
- http://sourceforge.net/p/libpng/bugs/241/
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/
- DSA-3399
- DSA-3399
- [oss-security] 20151026 CVE Requests for read out of bound in libpng
- [oss-security] 20151026 CVE Requests for read out of bound in libpng
- [oss-security] 20151026 Re: CVE Requests for read out of bound in libpng
- [oss-security] 20151026 Re: CVE Requests for read out of bound in libpng
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77304
- 77304
- 1034393
- 1034393
- USN-2815-1
- USN-2815-1
- RHSA-2016:1430
- RHSA-2016:1430
- GLSA-201611-08
- GLSA-201611-08
Modified: 2024-11-21
CVE-2015-8126
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- FEDORA-2015-5e52306c9c
- FEDORA-2015-5e52306c9c
- FEDORA-2015-1d87313b7c
- FEDORA-2015-1d87313b7c
- FEDORA-2015-ec2ddd15d7
- FEDORA-2015-ec2ddd15d7
- FEDORA-2015-501493d853
- FEDORA-2015-501493d853
- FEDORA-2015-13668fff74
- FEDORA-2015-13668fff74
- FEDORA-2015-97fc1797fa
- FEDORA-2015-97fc1797fa
- FEDORA-2015-8a1243db75
- FEDORA-2015-8a1243db75
- FEDORA-2016-9a1c707b10
- FEDORA-2016-9a1c707b10
- FEDORA-2016-43735c33a7
- FEDORA-2016-43735c33a7
- FEDORA-2015-c80ec85542
- FEDORA-2015-c80ec85542
- FEDORA-2015-233750b6ab
- FEDORA-2015-233750b6ab
- FEDORA-2015-4ad4998d00
- FEDORA-2015-4ad4998d00
- openSUSE-SU-2015:2099
- openSUSE-SU-2015:2099
- openSUSE-SU-2015:2100
- openSUSE-SU-2015:2100
- SUSE-SU-2016:0256
- SUSE-SU-2016:0256
- openSUSE-SU-2016:0263
- openSUSE-SU-2016:0263
- SUSE-SU-2016:0265
- SUSE-SU-2016:0265
- openSUSE-SU-2016:0268
- openSUSE-SU-2016:0268
- SUSE-SU-2016:0269
- SUSE-SU-2016:0269
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0279
- openSUSE-SU-2016:0279
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- openSUSE-SU-2015:2135
- openSUSE-SU-2015:2135
- openSUSE-SU-2015:2136
- openSUSE-SU-2015:2136
- openSUSE-SU-2015:2262
- openSUSE-SU-2015:2262
- openSUSE-SU-2015:2263
- openSUSE-SU-2015:2263
- openSUSE-SU-2016:0103
- openSUSE-SU-2016:0103
- openSUSE-SU-2016:0104
- openSUSE-SU-2016:0104
- openSUSE-SU-2016:0105
- openSUSE-SU-2016:0105
- RHSA-2015:2594
- RHSA-2015:2594
- RHSA-2015:2595
- RHSA-2015:2595
- RHSA-2015:2596
- RHSA-2015:2596
- RHSA-2016:0055
- RHSA-2016:0055
- RHSA-2016:0056
- RHSA-2016:0056
- RHSA-2016:0057
- RHSA-2016:0057
- DSA-3399
- DSA-3399
- DSA-3507
- DSA-3507
- [oss-security] 20151112 CVE request: libpng buffer overflow in png_set_PLTE
- [oss-security] 20151112 CVE request: libpng buffer overflow in png_set_PLTE
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77568
- 77568
- 1034142
- 1034142
- USN-2815-1
- USN-2815-1
- RHSA-2016:1430
- RHSA-2016:1430
- https://code.google.com/p/chromium/issues/detail?id=560291
- https://code.google.com/p/chromium/issues/detail?id=560291
- https://kc.mcafee.com/corporate/index?page=content&id=SB10148
- https://kc.mcafee.com/corporate/index?page=content&id=SB10148
- GLSA-201603-09
- GLSA-201603-09
- GLSA-201611-08
- GLSA-201611-08
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
Modified: 2024-11-21
CVE-2015-8472
Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- FEDORA-2015-c80ec85542
- FEDORA-2015-c80ec85542
- FEDORA-2015-233750b6ab
- FEDORA-2015-233750b6ab
- FEDORA-2015-4ad4998d00
- FEDORA-2015-4ad4998d00
- SUSE-SU-2016:0256
- SUSE-SU-2016:0256
- openSUSE-SU-2016:0263
- openSUSE-SU-2016:0263
- SUSE-SU-2016:0265
- SUSE-SU-2016:0265
- openSUSE-SU-2016:0268
- openSUSE-SU-2016:0268
- SUSE-SU-2016:0269
- SUSE-SU-2016:0269
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0279
- openSUSE-SU-2016:0279
- RHSA-2015:2594
- RHSA-2015:2594
- RHSA-2015:2595
- RHSA-2015:2595
- RHSA-2015:2596
- RHSA-2015:2596
- RHSA-2016:0055
- RHSA-2016:0055
- RHSA-2016:0056
- RHSA-2016:0056
- RHSA-2016:0057
- RHSA-2016:0057
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.65/
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.65/
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.55/
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.55/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.18/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.18/
- http://sourceforge.net/projects/libpng/files/libpng15/1.5.25/
- http://sourceforge.net/projects/libpng/files/libpng15/1.5.25/
- http://sourceforge.net/projects/libpng/files/libpng16/1.6.20/
- http://sourceforge.net/projects/libpng/files/libpng16/1.6.20/
- DSA-3443
- DSA-3443
- [oss-security] 20151203 Status of CVE-2015-8126: libpng buffer overflow in png_set_PLTE
- [oss-security] 20151203 Status of CVE-2015-8126: libpng buffer overflow in png_set_PLTE
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 78624
- 78624
- RHSA-2016:1430
- RHSA-2016:1430
- https://kc.mcafee.com/corporate/index?page=content&id=SB10148
- https://kc.mcafee.com/corporate/index?page=content&id=SB10148
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
Modified: 2024-11-21
CVE-2015-8540
Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
- FEDORA-2015-3868cfa17b
- FEDORA-2015-3868cfa17b
- http://sourceforge.net/p/libpng/bugs/244/
- http://sourceforge.net/p/libpng/bugs/244/
- http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/
- http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/
- http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/
- http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/
- DSA-3443
- DSA-3443
- [oss-security] 20151210 CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- [oss-security] 20151210 CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- [oss-security] 20151210 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- [oss-security] 20151210 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- [oss-security] 20151211 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- [oss-security] 20151211 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- [oss-security] 20151211 Re: Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- [oss-security] 20151211 Re: Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- [oss-security] 20151217 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- [oss-security] 20151217 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 80592
- 80592
- RHSA-2016:1430
- RHSA-2016:1430
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- GLSA-201611-08
- GLSA-201611-08
Modified: 2024-11-21
CVE-2016-10087
The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
- [oss-security] 20161229 libpng NULL pointer dereference bugfix
- [oss-security] 20161229 libpng NULL pointer dereference bugfix
- [oss-security] 20161230 Re: libpng NULL pointer dereference bugfix
- [oss-security] 20161230 Re: libpng NULL pointer dereference bugfix
- 95157
- 95157
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- GLSA-201701-74
- GLSA-201701-74
- USN-3712-1
- USN-3712-1
- USN-3712-2
- USN-3712-2