diff options
author | Elizabeth Fischer <rpf2116@columbia.edu> | 2017-01-04 11:32:10 -0500 |
---|---|---|
committer | Todd Gamblin <tgamblin@llnl.gov> | 2017-01-04 08:32:10 -0800 |
commit | 03471469e7f4059ab3a9be9637b64f6b852e6303 (patch) | |
tree | 38e0767c7bfbc37890145c836df295855aef3348 /var | |
parent | 2e24a3a2be933b853905131c360becb35b67ebf1 (diff) | |
download | spack-03471469e7f4059ab3a9be9637b64f6b852e6303.tar.gz spack-03471469e7f4059ab3a9be9637b64f6b852e6303.tar.bz2 spack-03471469e7f4059ab3a9be9637b64f6b852e6303.tar.xz spack-03471469e7f4059ab3a9be9637b64f6b852e6303.zip |
libpng: Upgrade versions to fix vulnerability. (#2723)
Diffstat (limited to 'var')
-rw-r--r-- | var/spack/repos/builtin/packages/libpng/package.py | 20 | ||||
-rw-r--r-- | var/spack/repos/builtin/packages/qt/package.py | 2 |
2 files changed, 15 insertions, 7 deletions
diff --git a/var/spack/repos/builtin/packages/libpng/package.py b/var/spack/repos/builtin/packages/libpng/package.py index fc55651497..46bbcebb89 100644 --- a/var/spack/repos/builtin/packages/libpng/package.py +++ b/var/spack/repos/builtin/packages/libpng/package.py @@ -29,14 +29,22 @@ class Libpng(AutotoolsPackage): """libpng is the official PNG reference library.""" homepage = "http://www.libpng.org/pub/png/libpng.html" - url = "http://download.sourceforge.net/libpng/libpng-1.6.26.tar.gz" + url = "http://download.sourceforge.net/libpng/libpng-1.6.27.tar.gz" - version('1.6.26', '236cd975520fc1f34cc0b8f0e615f7a0') - version('1.6.24', '65213080dd30a9b16193d9b83adc1ee9') - - # Security vulnerabilities have been discovered in 1.6.19 an older + version('1.6.27', '58698519e9f6126c1caeefc28dbcbd5f') + # From http://www.libpng.org/pub/png/libpng.html (2017-01-04) + # Virtually all libpng versions through 1.6.26, 1.5.27, + # 1.4.19, 1.2.56, and 1.0.66, respectively, have a + # null-pointer-dereference bug in png_set_text_2() when an + # image-editing application adds, removes, and re-adds text + # chunks to a PNG image. (This bug does not affect pure + # viewers, nor are there any known editors that could trigger + # it without interactive user input. It has been assigned ID + # CVE-2016-10087.) The vulnerability is fixed in versions + # 1.6.27, 1.5.28, 1.4.20, 1.2.57, and 1.0.67, released on 29 + # December 2016. # Required for qt@3 - version('1.2.56', '9508fc59d10a1ffadd9aae35116c19ee') + version('1.2.57', 'dfcda3603e29dcc11870c48f838ef75b') depends_on('zlib@1.0.4:') # 1.2.5 or later recommended diff --git a/var/spack/repos/builtin/packages/qt/package.py b/var/spack/repos/builtin/packages/qt/package.py index 6e6d4b95f6..d815add9f0 100644 --- a/var/spack/repos/builtin/packages/qt/package.py +++ b/var/spack/repos/builtin/packages/qt/package.py @@ -70,7 +70,7 @@ class Qt(Package): depends_on("zlib") depends_on("dbus", when='@4:+dbus') depends_on("libtiff") - depends_on("libpng@1.2.56", when='@3') + depends_on("libpng@1.2.57", when='@3') depends_on("libpng", when='@4:') depends_on("libmng") depends_on("jpeg") |