openSUSE: 2022:10142-1 moderate: pngcheck | LinuxSecurity.com

   openSUSE Security Update: Security update for pngcheck
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2022:10142-1
Rating:             moderate
References:         #1202662 
Cross-References:   CVE-2020-35511
CVSS scores:
                    CVE-2020-35511 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:
                    openSUSE Backports SLE-15-SP3
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for pngcheck fixes the following issues:

   version update to 3.0.3 [boo#1202662]

   * fixed a crash bug (and probable vulnerability) in large (MNG) LOOP chunks
   * fixed a divide-by-zero crash bug (and probable vulnerability) in
     interlaced images with extra compressed data beyond the nominal end of
     the image data (found by "chiba of topsec alpha lab")

   version update to 3.0.0

     * tweaked color definitions slightly to work better on terminals with
       white/light backgrounds
     * fixed DHDR (pre-MNG-1.0) bug identified by Winfried 
     * added eXIf support (GRR: added check for II/MM/unknown format)
     * converted static const help/usage-related strings to macros so
       -Werror=format-security doesn't trigger (Ben Beasley)
     * added (help2man-generated) man pages for all three utils added
       top-level LICENSE file; fixed various compiler warnings
     * fixed buffer-overflow vulnerability discovered by "giantbranch of
       NSFOCUS Security Team" *
       https://bugzilla.redhat.com/show_bug.cgi?id=1897485
     * found and fixed four additional vulnerabilities (null-pointer
       dereference and three buffer overruns)
     * an off-by-one bug in check_magic() (Lucy Phipps)
     * converted two zlib-version warnings/errors to go to stderr (Lemures
       Lemniscati, actually from 20180318; forwarded by LP)
     * fixed another buffer-overflow vulnerability discovered by "giantbranch
       of NSFOCUS Security Team"
       https://bugzilla.redhat.com/show_bug.cgi?id=1905775
     * removed -f ("force") option due to multiple security issues


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP3:

      zypper in -t patch openSUSE-2022-10142=1



Package List:

   - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):

      pngcheck-3.0.3-bp153.3.3.1


References:

   https://www.suse.com/security/cve/CVE-2020-35511.html
   https://bugzilla.suse.com/1202662

openSUSE: 2022:10142-1 moderate: pngcheck

October 5, 2022
An update that fixes one vulnerability is now available

Description

This update for pngcheck fixes the following issues: version update to 3.0.3 [boo#1202662] * fixed a crash bug (and probable vulnerability) in large (MNG) LOOP chunks * fixed a divide-by-zero crash bug (and probable vulnerability) in interlaced images with extra compressed data beyond the nominal end of the image data (found by "chiba of topsec alpha lab") version update to 3.0.0 * tweaked color definitions slightly to work better on terminals with white/light backgrounds * fixed DHDR (pre-MNG-1.0) bug identified by Winfried * added eXIf support (GRR: added check for II/MM/unknown format) * converted static const help/usage-related strings to macros so -Werror=format-security doesn't trigger (Ben Beasley) * added (help2man-generated) man pages for all three utils added top-level LICENSE file; fixed various compiler warnings * fixed buffer-overflow vulnerability discovered by "giantbranch of NSFOCUS Security Team" * https://bugzilla.redhat.com/show_bug.cgi?id=1897485 * found and fixed four additional vulnerabilities (null-pointer dereference and three buffer overruns) * an off-by-one bug in check_magic() (Lucy Phipps) * converted two zlib-version warnings/errors to go to stderr (Lemures Lemniscati, actually from 20180318; forwarded by LP) * fixed another buffer-overflow vulnerability discovered by "giantbranch of NSFOCUS Security Team" https://bugzilla.redhat.com/show_bug.cgi?id=1905775 * removed -f ("force") option due to multiple security issues

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2022-10142=1


Package List

- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64): pngcheck-3.0.3-bp153.3.3.1


References

https://www.suse.com/security/cve/CVE-2020-35511.html https://bugzilla.suse.com/1202662


Severity
Announcement ID: openSUSE-SU-2022:10142-1
Rating: moderate
Affected Products: openSUSE Backports SLE-15-SP3 . Affected Products: openSUSE Backports SLE-15-SP3 .

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.