CVE-2015-8126: Multiple buffer overflows

Bug #1516592 reported by wolf
294
This bug affects 6 people
Affects Status Importance Assigned to Milestone
libpng (Ubuntu)
Fix Released
High
Unassigned
Precise
Fix Released
High
Unassigned
Trusty
Fix Released
High
Unassigned
Vivid
Fix Released
High
Unassigned
Wily
Fix Released
High
Unassigned

Bug Description

Multiple buffer overflows were found in libpng, see https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8126

Tags: patch

CVE References

information type: Private Security → Public Security
Changed in libpng (Ubuntu):
status: New → Triaged
Revision history for this message
Andrew Starr-Bochicchio (andrewsomething) wrote :
summary: - Multiple buffer overflows
+ CVE-2015-8126: Multiple buffer overflows
Revision history for this message
Andrew Starr-Bochicchio (andrewsomething) wrote :

Debdiff for xenial incorporating the above upstream commits. Successfully builds in a clean xenial pbuilder.

Revision history for this message
Andrew Starr-Bochicchio (andrewsomething) wrote :

debdiff for 15.10 security update

Revision history for this message
Andrew Starr-Bochicchio (andrewsomething) wrote :

debdiff for 15.04 security update

Revision history for this message
Andrew Starr-Bochicchio (andrewsomething) wrote :

debdiff for 14.04 security update

Revision history for this message
Andrew Starr-Bochicchio (andrewsomething) wrote :

All of the above have been test build successfully with pbuilder for their respective releases. There doesn't seem to be any public POC yet...

Mathew Hodson (mhodson)
Changed in libpng (Ubuntu):
importance: Undecided → High
Changed in libpng (Ubuntu Trusty):
importance: Undecided → High
Changed in libpng (Ubuntu Vivid):
importance: Undecided → High
Changed in libpng (Ubuntu Wily):
importance: Undecided → High
tags: added: patch
Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Thanks for the debdiffs, building now for a security update!

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package libpng - 1.2.50-1ubuntu2.14.04.1

---------------
libpng (1.2.50-1ubuntu2.14.04.1) trusty-security; urgency=medium

  [ Andrew Starr-Bochicchio ]
  * SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
    and (2) png_get_PLTE (LP: #1516592).
    - debian/patches/CVE-2015-8126.diff: Prevent writing over-length
      PLTE chunk and silently truncate over-length PLTE chunk while reading.
      Backported from upstream patch.
    - CVE-2015-8126

  [ Marc Deslauriers ]
  * SECURITY UPDATE: out of bounds read in png_set_tIME
    - debian/patches/CVE-2015-7981.patch: check bounds in png.c and
      pngset.c.
    - CVE-2015-7981

 -- Marc Deslauriers <email address hidden> Thu, 19 Nov 2015 08:02:50 -0500

Changed in libpng (Ubuntu Trusty):
status: New → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package libpng - 1.2.51-0ubuntu3.15.10.1

---------------
libpng (1.2.51-0ubuntu3.15.10.1) wily-security; urgency=medium

  [ Andrew Starr-Bochicchio ]
  * SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
    and (2) png_get_PLTE (LP: #1516592).
    - debian/patches/CVE-2015-8126.diff: Prevent writing over-length
      PLTE chunk and silently truncate over-length PLTE chunk while reading.
      Backported from upstream patch.
    - CVE-2015-8126

  [ Marc Deslauriers ]
  * SECURITY UPDATE: out of bounds read in png_set_tIME
    - debian/patches/CVE-2015-7981.patch: check bounds in png.c and
      pngset.c.
    - CVE-2015-7981

 -- Marc Deslauriers <email address hidden> Thu, 19 Nov 2015 07:56:29 -0500

Changed in libpng (Ubuntu Wily):
status: New → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package libpng - 1.2.51-0ubuntu3.15.04.1

---------------
libpng (1.2.51-0ubuntu3.15.04.1) vivid-security; urgency=medium

  [ Andrew Starr-Bochicchio ]
  * SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
    and (2) png_get_PLTE (LP: #1516592).
    - debian/patches/CVE-2015-8126.diff: Prevent writing over-length
      PLTE chunk and silently truncate over-length PLTE chunk while reading.
      Backported from upstream patch.
    - CVE-2015-8126

  [ Marc Deslauriers ]
  * SECURITY UPDATE: out of bounds read in png_set_tIME
    - debian/patches/CVE-2015-7981.patch: check bounds in png.c and
      pngset.c.
    - CVE-2015-7981

 -- Marc Deslauriers <email address hidden> Thu, 19 Nov 2015 07:59:38 -0500

Changed in libpng (Ubuntu Vivid):
status: New → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package libpng - 1.2.46-3ubuntu4.1

---------------
libpng (1.2.46-3ubuntu4.1) precise-security; urgency=medium

  [ Andrew Starr-Bochicchio ]
  * SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
    and (2) png_get_PLTE (LP: #1516592).
    - debian/patches/CVE-2015-8126.diff: Prevent writing over-length
      PLTE chunk and silently truncate over-length PLTE chunk while reading.
      Backported from upstream patch.
    - CVE-2015-8126

  [ Marc Deslauriers ]
  * SECURITY UPDATE: out of bounds read in png_set_tIME
    - debian/patches/CVE-2015-7981.patch: check bounds in png.c and
      pngset.c.
    - CVE-2015-7981
  * SECURITY UPDATE: out of bounds read in png_push_read_zTXt
    - debian/patches/CVE-2012-3425.patch: check for truncated chunk in
      pngpread.c.
    - CVE-2012-3425

 -- Marc Deslauriers <email address hidden> Thu, 19 Nov 2015 08:05:59 -0500

Changed in libpng (Ubuntu Precise):
status: New → Fix Released
Changed in libpng (Ubuntu):
status: Triaged → Fix Released
Revision history for this message
Andrew Starr-Bochicchio (andrewsomething) wrote :

Thanks Marc!

Mathew Hodson (mhodson)
Changed in libpng (Ubuntu Precise):
importance: Undecided → High
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.