This bug was fixed in the package libpng - 1.2.51-0ubuntu3.15.10.1 --------------- libpng (1.2.51-0ubuntu3.15.10.1) wily-security; urgency=medium
[ Andrew Starr-Bochicchio ] * SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE (LP: #1516592). - debian/patches/CVE-2015-8126.diff: Prevent writing over-length PLTE chunk and silently truncate over-length PLTE chunk while reading. Backported from upstream patch. - CVE-2015-8126 [ Marc Deslauriers ] * SECURITY UPDATE: out of bounds read in png_set_tIME - debian/patches/CVE-2015-7981.patch: check bounds in png.c and pngset.c. - CVE-2015-7981 -- Marc Deslauriers <marc.deslauri...@ubuntu.com> Thu, 19 Nov 2015 07:56:29 -0500 ** Changed in: libpng (Ubuntu Vivid) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to libpng in Ubuntu. https://bugs.launchpad.net/bugs/1516592 Title: CVE-2015-8126: Multiple buffer overflows Status in libpng package in Ubuntu: Triaged Status in libpng source package in Precise: New Status in libpng source package in Trusty: Fix Released Status in libpng source package in Vivid: Fix Released Status in libpng source package in Wily: Fix Released Bug description: Multiple buffer overflows were found in libpng, see https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8126 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpng/+bug/1516592/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp