|
--76DTJ5CE0DCVQemd
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
==========================================================Ubuntu Security Notice USN-730-1 March 06, 2009
libpng vulnerabilities
CVE-2007-5268, CVE-2007-5269, CVE-2008-1382, CVE-2008-3964,
CVE-2008-5907, CVE-2009-0040
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
libpng12-0 1.2.8rel-5ubuntu0.4
Ubuntu 7.10:
libpng12-0 1.2.15~beta5-2ubuntu0.2
Ubuntu 8.04 LTS:
libpng12-0 1.2.15~beta5-3ubuntu0.1
Ubuntu 8.10:
libpng12-0 1.2.27-1ubuntu0.1
After a standard system upgrade you need to reboot your computer to
effect the necessary changes.
Details follow:
It was discovered that libpng did not properly perform bounds checking in
certain operations. An attacker could send a specially crafted PNG image and
cause a denial of service in applications linked against libpng. This issue
only affected Ubuntu 8.04 LTS. (CVE-2007-5268, CVE-2007-5269)
Tavis Ormandy discovered that libpng did not properly initialize memory. If a
user or automated system were tricked into opening a crafted PNG image, an
attacker could cause a denial of service via application crash, or possibly
execute arbitrary code with the privileges of the user invoking the program.
This issue did not affect Ubuntu 8.10. (CVE-2008-1382)
Harald van Dijk discovered an off-by-one error in libpng. An attacker could
could cause an application crash in programs using pngtest. (CVE-2008-3964)
It was discovered that libpng did not properly NULL terminate a keyword
string. An attacker could exploit this to set arbitrary memory locations to
zero. (CVE-2008-5907)
Glenn Randers-Pehrson discovered that libpng did not properly initialize
pointers. If a user or automated system were tricked into opening a crafted PNG
file, an attacker could cause a denial of service or possibly execute arbitrary
code with the privileges of the user invoking the program. (CVE-2009-0040)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5ubuntu0.4.diff.gz
Size/MD5: 19735 949fd37fe873e65120c79ed7d120f05d
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5ubuntu0.4.dsc
Size/MD5: 660 7280857d5c44750737addb4adafee14f
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel.orig.tar.gz
Size/MD5: 510681 cac1512878fb98f2456df6dc50bc9bc7
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.8rel-5ubuntu0.4_all.deb
Size/MD5: 842 21ee9c16fc1f3dbf732f0040ad75c850
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.4_amd64.deb
Size/MD5: 114308 fe9a7e7c5a252631f93f18952d409b86
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.4_amd64.deb
Size/MD5: 247658 62cab067f6e85d0be7b307eeebaa55c9
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.4_amd64.udeb
Size/MD5: 69562 9a979f0d9dc9604e4833aa0b61ff7376
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.4_i386.deb
Size/MD5: 111862 9d4675aaaa3ec2aacda34e041925c1df
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.4_i386.deb
Size/MD5: 239802 566beec7a8d8e24eb94af2cb14686078
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.4_i386.udeb
Size/MD5: 67038 717ec3d7283059720ba0525afc79dcee
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.4_powerpc.deb
Size/MD5: 111296 9aff23cce92553dcc297553693c64ef9
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.4_powerpc.deb
Size/MD5: 245356 b978fb399c02e38e2868a6c29e4f4d59
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.4_powerpc.udeb
Size/MD5: 66412 534a8b169f6f7ffc912c93a1b48feb79
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.4_sparc.deb
Size/MD5: 108980 00944b4687ef379d1c925de99c7d3768
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.4_sparc.deb
Size/MD5: 240216 f4213ee280f7a2c78f49f7d94935db3a
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.4_sparc.udeb
Size/MD5: 63956 812497bdce1af5d973adb0bec8393d1f
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-2ubuntu0.2.diff.gz
Size/MD5: 17802 70234c0a016f95a680d330c00ed767a6
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-2ubuntu0.2.dsc
Size/MD5: 831 aea067d70d037e161b02c7c84b8d43b6
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5.orig.tar.gz
Size/MD5: 829038 77ca14fcee1f1f4daaaa28123bd0b22d
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.15~beta5-2ubuntu0.2_all.deb
Size/MD5: 940 89445701e08689929173dbcfe576927d
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_amd64.deb
Size/MD5: 190298 d354b4581a09da60028363e65bd6216e
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_amd64.deb
Size/MD5: 180236 8954535c44eea6dd4baae6fd411c76e9
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_amd64.udeb
Size/MD5: 70894 b761c5fd1a687cfcfdc5f6a803afee2a
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_i386.deb
Size/MD5: 187974 031dc9442d58ec1e3e3e42fa7e4e29e4
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_i386.deb
Size/MD5: 171708 0f48e6210f770b3e1b7f59b5bf304367
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_i386.udeb
Size/MD5: 68572 e1d4bc8c516b2fda0d0b088d43a82091
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_lpia.deb
Size/MD5: 189454 6f27e35bdd3dc73695ab71f4517ed8b2
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_lpia.deb
Size/MD5: 173028 72c1b29825a4c0ee25c1407889c4016c
http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_lpia.udeb
Size/MD5: 70068 52246adc26148761838da10a1278f9ff
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_powerpc.deb
Size/MD5: 190168 bc69e2994b102798ebdbc4d2a3906a4f
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_powerpc.deb
Size/MD5: 179394 98809f9342fbe95ee5555bda740dd030
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_powerpc.udeb
Size/MD5: 70800 c0c6648842083bc20f7675434a4d401c
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_sparc.deb
Size/MD5: 185868 720a9587db72bc63364e541d202bb869
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_sparc.deb
Size/MD5: 173900 a2a9049485552ac8247e709b67d941b5
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_sparc.udeb
Size/MD5: 66478 7189e57d035d8e4ebf1985bd00b59514
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-3ubuntu0.1.diff.gz
Size/MD5: 18391 2a9f35d6f7a69fcce36ad8704b26d2e4
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-3ubuntu0.1.dsc
Size/MD5: 831 32b7c81ffbe2d2957fbff29f93882e25
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5.orig.tar.gz
Size/MD5: 829038 77ca14fcee1f1f4daaaa28123bd0b22d
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.15~beta5-3ubuntu0.1_all.deb
Size/MD5: 946 c0ca5a7e2bb96aeb13fcaba011b15f38
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_amd64.deb
Size/MD5: 189930 0a87561a09fdfea1544aae798bff51ad
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_amd64.deb
Size/MD5: 179762 a9f4e4d4a85afcff685323c4fdcb80fe
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_amd64.udeb
Size/MD5: 70556 4c076824555bef85baed162f08afdf90
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_i386.deb
Size/MD5: 188652 215fc54ddc5a153950ba26d3a42d3193
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_i386.deb
Size/MD5: 171394 376f39d2780a371e9660be083a27a49d
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_i386.udeb
Size/MD5: 69226 15b50ce121ae872dd58bdb1d2e0da902
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_lpia.deb
Size/MD5: 189542 f126365ada9df2ea731b37e0d3d76969
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_lpia.deb
Size/MD5: 173074 2c1b02af288a645f3b2ce46d636b3559
http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_lpia.udeb
Size/MD5: 70150 94bbd92c0f9cc566828b3c0b617e24c0
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_powerpc.deb
Size/MD5: 190084 c66c468c68c890154e569caa528d4b40
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_powerpc.deb
Size/MD5: 179312 be7f41fdd449790ac525b5b6807815dc
http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_powerpc.udeb
Size/MD5: 70684 56de9c4a7a91494cfc0dc6c5c0da1f0b
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_sparc.deb
Size/MD5: 185524 5706a2b50c7b44fbcec990c2b2943a0d
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_sparc.deb
Size/MD5: 173530 2dd22cb07e4d21c95635870988bd9eab
http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_sparc.udeb
Size/MD5: 66092 2ec57ae777558f2dc23208a128f57d23
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.27-1ubuntu0.1.diff.gz
Size/MD5: 15925 8a163f2089f6ef8d6c571cbf0eda1512
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.27-1ubuntu0.1.dsc
Size/MD5: 1292 206c905aeb49ddf0d5004e0afaf92318
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.27.orig.tar.gz
Size/MD5: 783204 13a0de401db1972a8e68f47d5bdadd13
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.27-1ubuntu0.1_all.deb
Size/MD5: 934 f4ead7835d85d0571a3fa097a0e63280
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_amd64.deb
Size/MD5: 168260 3a049b2b432ef4d52394956cd3b491b1
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_amd64.deb
Size/MD5: 255486 2b6865706eac275b1360549f3050fcc1
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_amd64.udeb
Size/MD5: 72834 c3309534ad5322fa6e222299c4da0b3a
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_i386.deb
Size/MD5: 166646 2160adb734db90aaf388c3398858ebd3
http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_i386.deb
Size/MD5: 247706 7b263a5d14791fa5c2c4ed464fea3db8
http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_i386.udeb
Size/MD5: 71172 7e3050071f423115e422375d2d549271
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_lpia.deb
Size/MD5: 167104 9ecff527d2a71d2622c3b49b2e3e622f
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_lpia.deb
Size/MD5: 248668 379bce13e320ebbd6504e113eeb11db8
http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_lpia.udeb
Size/MD5: 71534 257601cfb129ad1c21aff4e213beec86
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_powerpc.deb
Size/MD5: 167230 75ecf79cc491d5b8ecec24a186ed8051
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_powerpc.deb
Size/MD5: 254330 d327a222704cd603864abdee0805ecea
http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_powerpc.udeb
Size/MD5: 71718 9d879660f32c45280d083433b189023e
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_sparc.deb
Size/MD5: 162274 4e6ed662532e8d69da8e14e120034427
http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_sparc.deb
Size/MD5: 248262 91d8537dad0e04ac5abc362d5222cc3d
http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_sparc.udeb
Size/MD5: 66920 351736652216f25fb7fc8d61b68cb773
--76DTJ5CE0DCVQemd
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkmwiZIACgkQW0JvuRdL8BqF2ACfc3C6BPNdW6lnU+ROj+plDtpg
R1sAoIo3/JXt8vWTzGTIf331eIhBtyVQ
=Q9KQ
-----END PGP SIGNATURE-----
--76DTJ5CE0DCVQemd--