openSUSE-SU-2022:10142-1: moderate: Security update for pngcheck
openSUSE Security Update: Security update for pngcheck
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10142-1
Rating: moderate
References: #1202662
Cross-References: CVE-2020-35511
CVSS scores:
CVE-2020-35511 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for pngcheck fixes the following issues:
version update to 3.0.3 [boo#1202662]
* fixed a crash bug (and probable vulnerability) in large (MNG) LOOP chunks
* fixed a divide-by-zero crash bug (and probable vulnerability) in
interlaced images with extra compressed data beyond the nominal end of
the image data (found by "chiba of topsec alpha lab")
version update to 3.0.0
* tweaked color definitions slightly to work better on terminals with
white/light backgrounds
* fixed DHDR (pre-MNG-1.0) bug identified by Winfried
* added eXIf support (GRR: added check for II/MM/unknown format)
* converted static const help/usage-related strings to macros so
-Werror=format-security doesn't trigger (Ben Beasley)
* added (help2man-generated) man pages for all three utils added
top-level LICENSE file; fixed various compiler warnings
* fixed buffer-overflow vulnerability discovered by "giantbranch of
NSFOCUS Security Team" *
https://bugzilla.redhat.com/show_bug.cgi?id=1897485
* found and fixed four additional vulnerabilities (null-pointer
dereference and three buffer overruns)
* an off-by-one bug in check_magic() (Lucy Phipps)
* converted two zlib-version warnings/errors to go to stderr (Lemures
Lemniscati, actually from 20180318; forwarded by LP)
* fixed another buffer-overflow vulnerability discovered by "giantbranch
of NSFOCUS Security Team"
https://bugzilla.redhat.com/show_bug.cgi?id=1905775
* removed -f ("force") option due to multiple security issues
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-10142=1
Package List:
- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):
pngcheck-3.0.3-bp153.3.3.1
References:
https://www.suse.com/security/cve/CVE-2020-35511.html
https://bugzilla.suse.com/1202662
A pngcheck security update has been released for SUSE Linux Enterprise 15 SP3.