Scientific Linux Security Update : libpng on SL7.x x86_64

High Nessus Plugin ID 87585


The remote Scientific Linux host is missing one or more security updates.


It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472)


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 87585

File Name: sl_20151209_libpng_on_SL7_x.nasl

Version: $Revision: 2.4 $

Type: local

Agent: unix

Published: 2015/12/22

Modified: 2016/10/19

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P


Base Score: 7.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2015/12/09

Reference Information

CVE: CVE-2015-8126, CVE-2015-8472