Linux Security
Linux Security
Linux Security

Debian: libpng buffer overflow vulnerability

Date 19 Dec 2002
Posted By LinuxSecurity Advisories
There is a problem in connection with 16-bit samples from libpng, an interface for reading and writing PNG format files.

Debian Security Advisory DSA 213-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
December 19th, 2002            

Package        : libpng, libpng3
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2002-1363

Glenn Randers-Pehrson discovered a problem in connection with 16-bit
samples from libpng, an interface for reading and writing PNG
(Portable Network Graphics) format files.  The starting offsets for
the loops are calculated incorrectly which causes a buffer overrun
beyond the beginning of the row buffer.

For the current stable distribution (woody) this problem has been
fixed in version 1.0.12-3.woody.3 for libpng and in version
1.2.1-1.1.woody.3 for libpng3.

For the old stable distribution (potato) this problem has been fixed
in version 1.0.5-1.1 for libpng.  There are no other libpng packages.

For the unstable distribution (sid) this problem has been fixed in
version 1.0.12-7 for libpng and in version 1.2.5-8 for libpng3.

We recommend that you upgrade your libpng packages.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 2.2 alias potato

  Source archives:
      Size/MD5 checksum:      536 9ffdc9f0409f8c633a98f990b5de711e
      Size/MD5 checksum:     7437 8fa1a097a9954cec5b9d3d1b5d0c8452
      Size/MD5 checksum:   299401 e8edc8c1ad4cb613f20563acd9112702

  Alpha architecture:
      Size/MD5 checksum:   116406 dd2c8f175bab63876bc7b92b2dcd6c05
      Size/MD5 checksum:   208052 a9d10119a2844b7bd458a13d0454a4f0

  ARM architecture:
      Size/MD5 checksum:    93146 30c73d5182f62be1a3bf49c856e0f2b7
      Size/MD5 checksum:   181912 ebd2d7f0a5a047e120ddcda389bfcc40

  Intel IA-32 architecture:
      Size/MD5 checksum:    93642 adaf7a70c5c96cc86dd37e3e97662749
      Size/MD5 checksum:   174272 55f53fa4fd4c4f4c56a9b6d89e466f21

  Motorola 680x0 architecture:
      Size/MD5 checksum:    89316 742095f437273c7289aef6360ea4d6c8
      Size/MD5 checksum:   167102 36c31b242f0912d6bc56d4e5729a00b4

  PowerPC architecture:
      Size/MD5 checksum:    94970 fbb5a56753334bb2b8d7bc7d2d398d74
      Size/MD5 checksum:   179638 51474277e15f2e1433cdbacddbe31951

  Sun Sparc architecture:
      Size/MD5 checksum:    95768 ccf30b2045949519216838dc548f065b
      Size/MD5 checksum:   177530 58ba980f4f9522617896bfb2411c0e6c

Debian GNU/Linux 3.0 alias woody

  Source archives:
      Size/MD5 checksum:      579 c74a70217fad295e39dbcd9f91c27798
      Size/MD5 checksum:     8222 cfd297d5a73b4945308fa63d6de12824
      Size/MD5 checksum:   481387 3329b745968e41f6f9e55a4d04a4964c
      Size/MD5 checksum:      582 84306358085957c3e73f6edce0b01023
      Size/MD5 checksum:     8602 a8560f3de1b5c30a97c4c74cf57bfa4a
      Size/MD5 checksum:   493105 75a21cbfae566158a0ac6d9f39087c4d

  Alpha architecture:
      Size/MD5 checksum:   129824 ef01cd5ebaeabb1edd8b9cb411f536e7
      Size/MD5 checksum:   270254 ca7ac90316d111e5fbb211445b15c08c
      Size/MD5 checksum:   276366 027232e8a4c293b0ab4ff59a1a21317d
      Size/MD5 checksum:   133226 cabc7adaf2228282a0585bd5339433ea

  ARM architecture:
      Size/MD5 checksum:   108294 2ef37013545787e20ad78922b0382a94
      Size/MD5 checksum:   241198 840d64491ca335c43efe1f11f378c9ff
      Size/MD5 checksum:   247452 5858106d712c5c3c9d6b54abf3e6d663
      Size/MD5 checksum:   111598 5ffa0998e3abe9b58a89a38b7117bfc7

  Intel IA-32 architecture:
      Size/MD5 checksum:   106734 aee84117c46174aa08e61f5c6b1a0f92
      Size/MD5 checksum:   227318 defd55edc6ec866586b9e321515048ea
      Size/MD5 checksum:   233106 6674671edd9b8e349d63eb900a0bddc7
      Size/MD5 checksum:   109870 b520c9348e5b354988120cef5a8e514d

  Intel IA-64 architecture:
      Size/MD5 checksum:   146240 d65c17098de1668dd401cf53b9a4ec32
      Size/MD5 checksum:   271438 b0d61c89269507d41af7f783c98d4622
      Size/MD5 checksum:   278588 923b1157db9104ae3f78639a6030b3c5
      Size/MD5 checksum:   150932 60902703eadffbc3cca6b85d6bee1ba6

  HP Precision architecture:
      Size/MD5 checksum:   128352 f4ab41d4228091d5872f7200c82aae38
      Size/MD5 checksum:   262360 153afecfe0cb445d3d1885c1bad10d99
      Size/MD5 checksum:   269428 2e5a45b68eb473065cca5d4728bdb255
      Size/MD5 checksum:   132400 b78a44f965799da6bca84e8a2442807f

  Motorola 680x0 architecture:
      Size/MD5 checksum:   103330 8c24930d1488550c38ae5c312666b53c
      Size/MD5 checksum:   220490 a64cea99028f39875bda8fff243b5cb4
      Size/MD5 checksum:   226074 209d2f4d40de2316ff6e22f13158afd4
      Size/MD5 checksum:   106322 0694cf5a572dabf9432984751793609b

  Big endian MIPS architecture:
      Size/MD5 checksum:   108408 babde9e03669d04e64f330e160a428da
      Size/MD5 checksum:   240380 e63d3a6c2d79c9cf2d516ded4fdbd86c
      Size/MD5 checksum:   246802 3a496e2fbee861e2332720c56154d422
      Size/MD5 checksum:   111788 7f193f85d15b95aca1d6f91b59a21de1

  Little endian MIPS architecture:
      Size/MD5 checksum:   108284 86165469fd2e759fa89920ef0f78c517
      Size/MD5 checksum:   240270 6865778b24bae9b165767d9a68b611ae
      Size/MD5 checksum:   246762 b435ec67b82c67ca49a1fae62e890143
      Size/MD5 checksum:   111704 101f3aba794a31b563ae21689df95e78

  PowerPC architecture:
      Size/MD5 checksum:   109692 f83b2b0373ee54c4ddab81e02a2fa3bc
      Size/MD5 checksum:   234364 cceab4d763baead38e33c1191bb77f88
      Size/MD5 checksum:   240364 1c6423ea77320e71cfa1c861f2ff3e0f
      Size/MD5 checksum:   112736 4ac7fd36101c7cfbf388ad0bbe8b8d73

  IBM S/390 architecture:
      Size/MD5 checksum:   107434 671e55d0474ddf881f13055a1197cbb1
      Size/MD5 checksum:   226536 706f5ed4934fe1a699164fe3237e3e95
      Size/MD5 checksum:   232394 dec9877641f0982131adcdc9b207e12e
      Size/MD5 checksum:   110896 57c1d8704aa9d0af5bda68ef569c39e9

  Sun Sparc architecture:
      Size/MD5 checksum:   109806 6441ca6b206335e7f2de615c7fb52ef7
      Size/MD5 checksum:   231856 d9d2fb80736b7b5c012c58fb87b7a130
      Size/MD5 checksum:   237666 a503daffff60d0ee17bd30f4ca0b512a
      Size/MD5 checksum:   113206 5d1fffdac908d6ac7f56d609ea723485

  These files will probably be moved into the stable distribution on
  its next revision.

For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"44","type":"x","order":"1","pct":81.48,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"5","type":"x","order":"2","pct":9.26,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":9.26,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.