Hello community,

here is the log from the commit of package pngcheck for openSUSE:Factory 
checked in at 2020-12-03 18:43:19
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/pngcheck (Old)
 and      /work/SRC/openSUSE:Factory/.pngcheck.new.5913 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "pngcheck"

Thu Dec  3 18:43:19 2020 rev:5 rq:852889 version:2.3.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/pngcheck/pngcheck.changes        2015-08-03 
17:22:05.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.pngcheck.new.5913/pngcheck.changes      
2020-12-03 18:44:07.242268011 +0100
@@ -1,0 +2,8 @@
+Thu Dec  3 11:45:40 UTC 2020 - pgaj...@suse.com
+
+- security update
+- added patches
+  fix CVE-2020-27818 [bsc#1179528], global buffer overflow was discovered in 
check_chunk_name function via crafted pngfile
+  + pngcheck-CVE-2020-27818.patch
+
+-------------------------------------------------------------------

New:
----
  pngcheck-CVE-2020-27818.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ pngcheck.spec ++++++
--- /var/tmp/diff_new_pack.dOyvyP/_old  2020-12-03 18:44:07.734268872 +0100
+++ /var/tmp/diff_new_pack.dOyvyP/_new  2020-12-03 18:44:07.734268872 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package pngcheck
 #
-# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2020 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -12,7 +12,7 @@
 # license that conforms to the Open Source Definition (Version 1.9)
 # published by the Open Source Initiative.
 
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
 #
 
 
@@ -20,12 +20,14 @@
 Version:        2.3.0
 Release:        0
 Summary:        PNG file format checker
-License:        HPND and GPL-2.0+
+License:        HPND AND GPL-2.0-or-later
 Group:          Productivity/Graphics/Other
-Url:            http://www.libpng.org/pub/png/apps/pngcheck.html
+URL:            http://www.libpng.org/pub/png/apps/pngcheck.html
 Source:         
http://prdownloads.sourceforge.net/png-mng/%{name}-%{version}.tar.gz
 Source2:        %{name}.1.gz
 Patch0:         fixbuild.diff
+# CVE-2020-27818 [bsc#1179528], global buffer overflow was discovered in 
check_chunk_name function via crafted pngfile
+Patch1:         pngcheck-CVE-2020-27818.patch
 BuildRequires:  zlib-devel
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 
@@ -43,6 +45,7 @@
 %prep
 %setup -q
 %patch0 -p1
+%patch1 -p1
 
 %build
 make %{?_smp_mflags} -f Makefile.unx

++++++ pngcheck-CVE-2020-27818.patch ++++++
Fix buffer overflow reported in RHBZ #1897485.

When char is signed, casting to a (signed) int directly could produce a
negative offset into the ASCII lookup table; adding an intermediate cast to uch
(a typedef for unsigned char) ensures a nonnegative offset no greater than 255,
which always corresponds to a valid table index.

diff -Naur pngcheck-2.3.0-original/pngcheck.c pngcheck-2.3.0/pngcheck.c
--- pngcheck-2.3.0-original/pngcheck.c  2007-07-08 02:23:31.000000000 -0400
+++ pngcheck-2.3.0/pngcheck.c   2020-11-13 11:24:31.039164410 -0500
@@ -4895,8 +4895,10 @@
 /* GRR 20061203:  now EBCDIC-safe */
 int check_chunk_name(char *chunk_name, char *fname)
 {
-  if (isASCIIalpha((int)chunk_name[0]) && isASCIIalpha((int)chunk_name[1]) &&
-      isASCIIalpha((int)chunk_name[2]) && isASCIIalpha((int)chunk_name[3]))
+  if (isASCIIalpha((int)(uch)chunk_name[0]) &&
+      isASCIIalpha((int)(uch)chunk_name[1]) &&
+      isASCIIalpha((int)(uch)chunk_name[2]) &&
+      isASCIIalpha((int)(uch)chunk_name[3]))
     return 0;

   printf("%s%s  invalid chunk name \"%.*s\" (%02x %02x %02x %02x)\n",
_______________________________________________
openSUSE Commits mailing list -- commit@lists.opensuse.org
To unsubscribe, email commit-le...@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: 
https://lists.opensuse.org/archives/list/commit@lists.opensuse.org

Reply via email to