Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: libpng buffer overflow vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by Team   
Debian There is a problem in connection with 16-bit samples from libpng, an interface for reading and writing PNG format files.

Debian Security Advisory DSA 213-1                                        Martin Schulze
December 19th, 2002            

Package        : libpng, libpng3
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2002-1363

Glenn Randers-Pehrson discovered a problem in connection with 16-bit
samples from libpng, an interface for reading and writing PNG
(Portable Network Graphics) format files.  The starting offsets for
the loops are calculated incorrectly which causes a buffer overrun
beyond the beginning of the row buffer.

For the current stable distribution (woody) this problem has been
fixed in version 1.0.12-3.woody.3 for libpng and in version
1.2.1-1.1.woody.3 for libpng3.

For the old stable distribution (potato) this problem has been fixed
in version 1.0.5-1.1 for libpng.  There are no other libpng packages.

For the unstable distribution (sid) this problem has been fixed in
version 1.0.12-7 for libpng and in version 1.2.5-8 for libpng3.

We recommend that you upgrade your libpng packages.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 2.2 alias potato

  Source archives:
      Size/MD5 checksum:      536 9ffdc9f0409f8c633a98f990b5de711e
      Size/MD5 checksum:     7437 8fa1a097a9954cec5b9d3d1b5d0c8452
      Size/MD5 checksum:   299401 e8edc8c1ad4cb613f20563acd9112702

  Alpha architecture:
      Size/MD5 checksum:   116406 dd2c8f175bab63876bc7b92b2dcd6c05
      Size/MD5 checksum:   208052 a9d10119a2844b7bd458a13d0454a4f0

  ARM architecture:
      Size/MD5 checksum:    93146 30c73d5182f62be1a3bf49c856e0f2b7
      Size/MD5 checksum:   181912 ebd2d7f0a5a047e120ddcda389bfcc40

  Intel IA-32 architecture:
      Size/MD5 checksum:    93642 adaf7a70c5c96cc86dd37e3e97662749
      Size/MD5 checksum:   174272 55f53fa4fd4c4f4c56a9b6d89e466f21

  Motorola 680x0 architecture:
      Size/MD5 checksum:    89316 742095f437273c7289aef6360ea4d6c8
      Size/MD5 checksum:   167102 36c31b242f0912d6bc56d4e5729a00b4

  PowerPC architecture:
      Size/MD5 checksum:    94970 fbb5a56753334bb2b8d7bc7d2d398d74
      Size/MD5 checksum:   179638 51474277e15f2e1433cdbacddbe31951

  Sun Sparc architecture:
      Size/MD5 checksum:    95768 ccf30b2045949519216838dc548f065b
      Size/MD5 checksum:   177530 58ba980f4f9522617896bfb2411c0e6c

Debian GNU/Linux 3.0 alias woody

  Source archives:
      Size/MD5 checksum:      579 c74a70217fad295e39dbcd9f91c27798
      Size/MD5 checksum:     8222 cfd297d5a73b4945308fa63d6de12824
      Size/MD5 checksum:   481387 3329b745968e41f6f9e55a4d04a4964c
      Size/MD5 checksum:      582 84306358085957c3e73f6edce0b01023
      Size/MD5 checksum:     8602 a8560f3de1b5c30a97c4c74cf57bfa4a
      Size/MD5 checksum:   493105 75a21cbfae566158a0ac6d9f39087c4d

  Alpha architecture:
      Size/MD5 checksum:   129824 ef01cd5ebaeabb1edd8b9cb411f536e7
      Size/MD5 checksum:   270254 ca7ac90316d111e5fbb211445b15c08c
      Size/MD5 checksum:   276366 027232e8a4c293b0ab4ff59a1a21317d
      Size/MD5 checksum:   133226 cabc7adaf2228282a0585bd5339433ea

  ARM architecture:
      Size/MD5 checksum:   108294 2ef37013545787e20ad78922b0382a94
      Size/MD5 checksum:   241198 840d64491ca335c43efe1f11f378c9ff
      Size/MD5 checksum:   247452 5858106d712c5c3c9d6b54abf3e6d663
      Size/MD5 checksum:   111598 5ffa0998e3abe9b58a89a38b7117bfc7

  Intel IA-32 architecture:
      Size/MD5 checksum:   106734 aee84117c46174aa08e61f5c6b1a0f92
      Size/MD5 checksum:   227318 defd55edc6ec866586b9e321515048ea
      Size/MD5 checksum:   233106 6674671edd9b8e349d63eb900a0bddc7
      Size/MD5 checksum:   109870 b520c9348e5b354988120cef5a8e514d

  Intel IA-64 architecture:
      Size/MD5 checksum:   146240 d65c17098de1668dd401cf53b9a4ec32
      Size/MD5 checksum:   271438 b0d61c89269507d41af7f783c98d4622
      Size/MD5 checksum:   278588 923b1157db9104ae3f78639a6030b3c5
      Size/MD5 checksum:   150932 60902703eadffbc3cca6b85d6bee1ba6

  HP Precision architecture:
      Size/MD5 checksum:   128352 f4ab41d4228091d5872f7200c82aae38
      Size/MD5 checksum:   262360 153afecfe0cb445d3d1885c1bad10d99
      Size/MD5 checksum:   269428 2e5a45b68eb473065cca5d4728bdb255
      Size/MD5 checksum:   132400 b78a44f965799da6bca84e8a2442807f

  Motorola 680x0 architecture:
      Size/MD5 checksum:   103330 8c24930d1488550c38ae5c312666b53c
      Size/MD5 checksum:   220490 a64cea99028f39875bda8fff243b5cb4
      Size/MD5 checksum:   226074 209d2f4d40de2316ff6e22f13158afd4
      Size/MD5 checksum:   106322 0694cf5a572dabf9432984751793609b

  Big endian MIPS architecture:
      Size/MD5 checksum:   108408 babde9e03669d04e64f330e160a428da
      Size/MD5 checksum:   240380 e63d3a6c2d79c9cf2d516ded4fdbd86c
      Size/MD5 checksum:   246802 3a496e2fbee861e2332720c56154d422
      Size/MD5 checksum:   111788 7f193f85d15b95aca1d6f91b59a21de1

  Little endian MIPS architecture:
      Size/MD5 checksum:   108284 86165469fd2e759fa89920ef0f78c517
      Size/MD5 checksum:   240270 6865778b24bae9b165767d9a68b611ae
      Size/MD5 checksum:   246762 b435ec67b82c67ca49a1fae62e890143
      Size/MD5 checksum:   111704 101f3aba794a31b563ae21689df95e78

  PowerPC architecture:
      Size/MD5 checksum:   109692 f83b2b0373ee54c4ddab81e02a2fa3bc
      Size/MD5 checksum:   234364 cceab4d763baead38e33c1191bb77f88
      Size/MD5 checksum:   240364 1c6423ea77320e71cfa1c861f2ff3e0f
      Size/MD5 checksum:   112736 4ac7fd36101c7cfbf388ad0bbe8b8d73

  IBM S/390 architecture:
      Size/MD5 checksum:   107434 671e55d0474ddf881f13055a1197cbb1
      Size/MD5 checksum:   226536 706f5ed4934fe1a699164fe3237e3e95
      Size/MD5 checksum:   232394 dec9877641f0982131adcdc9b207e12e
      Size/MD5 checksum:   110896 57c1d8704aa9d0af5bda68ef569c39e9

  Sun Sparc architecture:
      Size/MD5 checksum:   109806 6441ca6b206335e7f2de615c7fb52ef7
      Size/MD5 checksum:   231856 d9d2fb80736b7b5c012c58fb87b7a130
      Size/MD5 checksum:   237666 a503daffff60d0ee17bd30f4ca0b512a
      Size/MD5 checksum:   113206 5d1fffdac908d6ac7f56d609ea723485

  These files will probably be moved into the stable distribution on
  its next revision.

For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show ' and

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
OpenSSL Mystery Patch is No Heartbleed
Study: One-third of top websites vulnerable or hacked
Threat-sharing cybersecurity bill unveiled
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.