|Index||index by Group||index by Distribution||index by Vendor||index by creation date||index by Name||Mirrors||Help||Search|
|Name: libpng12-0-32bit||Distribution: openSUSE Leap 15.2|
|Version: 1.2.57||Vendor: openSUSE|
|Release: lp152.4.5||Build date: Sat May 16 09:29:29 2020|
|Group: System/Libraries||Build host: cloud101|
|Size: 214532||Source RPM: libpng12-1.2.57-lp152.4.5.src.rpm|
|Summary: Library for the Portable Network Graphics Format (PNG)|
libpng is the official reference library for the Portable Network Graphics format (PNG).
* Wed Jan 31 2018 email@example.com - check with -j1, be explicit * Tue Jan 30 2018 firstname.lastname@example.org - Fix SRPM group and grammar issues. * Mon Jan 02 2017 email@example.com - updated to 1.2.57: fixes CVE-2016-10087 * Thu Dec 17 2015 firstname.lastname@example.org - updated to 1.2.56: Fixed an out-of-range read in png_check_keyword() (Bug report from Qixue Xiao, CVE-2015-8540). Added keyword checks to pngset.c * Thu Dec 03 2015 email@example.com - updated to 1.2.55: Avoid potential pointer overflow in png_handle_iTXt(), png_handle_zTXt(), png_handle_sPLT(), and png_handle_pCAL() (Bug report by John Regehr). Fixed incorrect implementation of png_set_PLTE() that uses png_ptr not info_ptr, that left png_set_PLTE() open to the CVE-2015-8126 vulnerability. * Fri Nov 13 2015 firstname.lastname@example.org - updated to 1.2.54 * Fri Aug 07 2015 email@example.com - build in build section * Fri Feb 27 2015 firstname.lastname@example.org - updated to 1.2.53: Issue a png_error() instead of a png_warning() when width is potentially too large for the architecture, in case the calling application has overridden the default 1,000,000-column limit (fixes CVE-2014-9495 and CVE-2015-0973). Display user limits in the output from pngtest. Changed PNG_USER_CHUNK_MALLOC_MAX from unlimited to 8,000,000. This can only be changed at library-build time. It only affects the maximum memory that can be allocated to an ancillary chunk; it does not limit the size of IDAT data, which is instead limited by PNG_USER_WIDTH_MAX. * Mon Jan 19 2015 email@example.com - Fix CVE-2013-7354.patch, include limits.h for INT_MAX * Thu Nov 20 2014 firstname.lastname@example.org - updated to 1.2.52: * Avoid out-of-bounds memory access while checking version string.
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue May 9 12:55:56 2023