Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:046
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : libpng
 Date    : April 2, 2012
 Affected: 2010.1, 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A potential memory corruption has been found and corrected in libpng
 (CVE-2011-3048).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2010.1:
 32abd71c77121d32499ca6b0a2adea11  2010.1/i586/libpng3-1.2.43-1.5mdv2010.2.i586.rpm
 64bc26eb682602cb681f24596cc4a2ac  2010.1/i586/libpng-devel-1.2.43-1.5mdv2010.2.i586.rpm
 110c7a43ed4fce2854787fdb118b338b  2010.1/i586/libpng-source-1.2.43-1.5mdv2010.2.i586.rpm
 dcc52b6e893eab6419da5a23e64c70f0  2010.1/i586/libpng-static-devel-1.2.43-1.5mdv2010.2.i586.rpm 
 edd41240bf0a82cf1f003d1932b20322  2010.1/SRPMS/libpng-1.2.43-1.5mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 14297484d771723c1836969d7916ae4f  2010.1/x86_64/lib64png3-1.2.43-1.5mdv2010.2.x86_64.rpm
 e6deb402006790e218bdce7fe8dbc07c  2010.1/x86_64/lib64png-devel-1.2.43-1.5mdv2010.2.x86_64.rpm
 0f4eaf1b5cb2a9797a62bfc1c51237ff  2010.1/x86_64/lib64png-static-devel-1.2.43-1.5mdv2010.2.x86_64.rpm
 477ff7378350377399f217c3035d4387  2010.1/x86_64/libpng-source-1.2.43-1.5mdv2010.2.x86_64.rpm 
 edd41240bf0a82cf1f003d1932b20322  2010.1/SRPMS/libpng-1.2.43-1.5mdv2010.2.src.rpm

 Mandriva Linux 2011:
 42e6677e1cc0bb9bb5aed1cd43f0736e  2011/i586/libpng3-1.2.46-1.3-mdv2011.0.i586.rpm
 c30dabb7d3d4a3b0f6c06ca7b8f12dd9  2011/i586/libpng-devel-1.2.46-1.3-mdv2011.0.i586.rpm
 90772d7378e18524ffd2d762aa0897f1  2011/i586/libpng-source-1.2.46-1.3-mdv2011.0.i586.rpm
 9bd1bfb1fdede615a291b422b8b345a2  2011/i586/libpng-static-devel-1.2.46-1.3-mdv2011.0.i586.rpm 
 6374920ff2b00d9c4b6a3d4cf4be2ce4  2011/SRPMS/libpng-1.2.46-1.3.src.rpm

 Mandriva Linux 2011/X86_64:
 49eb04c19c3754e0edafce7a9b275a6c  2011/x86_64/lib64png3-1.2.46-1.3-mdv2011.0.x86_64.rpm
 6d9f8f5744025d03a33b78c57ac26cec  2011/x86_64/lib64png-devel-1.2.46-1.3-mdv2011.0.x86_64.rpm
 a0aa36751025c8bf8c69111ba1c8630f  2011/x86_64/lib64png-static-devel-1.2.46-1.3-mdv2011.0.x86_64.rpm
 a5fdad34063a5455ed605f91d4295fa7  2011/x86_64/libpng-source-1.2.46-1.3-mdv2011.0.x86_64.rpm 
 6374920ff2b00d9c4b6a3d4cf4be2ce4  2011/SRPMS/libpng-1.2.46-1.3.src.rpm

 Mandriva Enterprise Server 5:
 48c4b58100e8610b1c02edad1b22f513  mes5/i586/libpng3-1.2.31-2.7mdvmes5.2.i586.rpm
 ea8eaff21b47e466c39fb67d05caf5dc  mes5/i586/libpng-devel-1.2.31-2.7mdvmes5.2.i586.rpm
 b47d4cc245409339a0bb5661d6a042b2  mes5/i586/libpng-source-1.2.31-2.7mdvmes5.2.i586.rpm
 0f6c3f3a2f852745298c17d2ab350979  mes5/i586/libpng-static-devel-1.2.31-2.7mdvmes5.2.i586.rpm 
 b9250ed0aaa605e52c5e42068a1e9e04  mes5/SRPMS/libpng-1.2.31-2.7mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 11f921419ff975163b42d90749745ba6  mes5/x86_64/lib64png3-1.2.31-2.7mdvmes5.2.x86_64.rpm
 4c5ca107c3e976b411ea6c0012191ca7  mes5/x86_64/lib64png-devel-1.2.31-2.7mdvmes5.2.x86_64.rpm
 b06e79b357af44896ab2ed0d82724b39  mes5/x86_64/lib64png-static-devel-1.2.31-2.7mdvmes5.2.x86_64.rpm
 b356a0406ab7403663f6d914e424a3a6  mes5/x86_64/libpng-source-1.2.31-2.7mdvmes5.2.x86_64.rpm 
 b9250ed0aaa605e52c5e42068a1e9e04  mes5/SRPMS/libpng-1.2.31-2.7mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPeTLimqjQ0CJFipgRAj/VAKC0m/tdpsxpTI8Sszz56XRSIhVUsQCg6cPd
EJ2GOf6tJUkGMX/Tq9k+a+E=
=lFXJ
-----END PGP SIGNATURE-----




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.