New libpng packages are available for Debian GNU/Linux
---------------------------------------------------------------------------
Debian Security Advisory DSA 570-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
October 20th, 2004 http://www.debian.org/security/faq
---------------------------------------------------------------------------
Package : libpng
Vulnerability : integer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0955
Several integer overflows have been discovered by its upstream developers in libpng, a commonly used library to display PNG graphics. They could be exploited to cause arbitrary code to be executed when a specially crafted PNG image is processed.
For the stable distribution (woody) this problem has been fixed in version 1.0.12-3.woody.9.
For the unstable distribution (sid) this problem has been fixed in version 1.0.15-8.
We recommend that you upgrade your libpng packages.
Upgrade Instructions
---------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
---------------------------------
Source archives:
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.dsc
Size/MD5 checksum: 580 7df7d1e0bbd2332551a14cc0a21dddf7
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.diff.gz
Size/MD5 checksum: 10396 dbf46963e7b26473fffba63a92791286
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12.orig.tar.gz
Size/MD5 checksum: 481387 3329b745968e41f6f9e55a4d04a4964c
Alpha architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_alpha.deb
Size/MD5 checksum: 130374 1044ec55646f8e94e218bf4613db1f60
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_alpha.deb
Size/MD5 checksum: 270440 74a5b9e3bc1b2fc2648133e196894b4f
ARM architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_arm.deb
Size/MD5 checksum: 109148 60e7475df4f824043242559b7d64322e
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_arm.deb
Size/MD5 checksum: 241496 f9ad072eb50a9391ce4b105eff9b2cba
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_i386.deb
Size/MD5 checksum: 107434 e81d90d93fc69329f1fc842666ab8bf2
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_i386.deb
Size/MD5 checksum: 227648 a5495e210300e511e7c265e86303c909
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_ia64.deb
Size/MD5 checksum: 147520 5292b0c17956697fa682a95be34abc0d
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_ia64.deb
Size/MD5 checksum: 271938 ae7b7fed469735915bbdf87ab02f80a3
HP Precision architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_hppa.deb
Size/MD5 checksum: 128830 b1937fc261ba66c8b69605c0f8df9305
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_hppa.deb
Size/MD5 checksum: 262630 be93d764c002923fb1e6d5385b12e200
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_m68k.deb
Size/MD5 checksum: 104172 86a18a750a19efbe94f8b79d9e4e89c8
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_m68k.deb
Size/MD5 checksum: 220804 d4b278997d86fe7cd824f2ad820a8466
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mips.deb
Size/MD5 checksum: 109184 b825d9e4e59ed06f5ff718d86c078714
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mips.deb
Size/MD5 checksum: 240698 883d442e57eef30ad86251ce2ffed701
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mipsel.deb
Size/MD5 checksum: 109102 eb85fee5ef0e9516372a7e245fd781ce
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mipsel.deb
Size/MD5 checksum: 240576 da9b75f48689e9277b8a053c014e8ddc
PowerPC architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_powerpc.deb
Size/MD5 checksum: 110504 b7ab6493588e05c09811e3f58fa747b2
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_powerpc.deb
Size/MD5 checksum: 234800 1e1bacb0bbe2d80166d4ce9f96348828
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_s390.deb
Size/MD5 checksum: 110520 29172e2fc592785d44b5779ed7787f08
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_s390.deb
Size/MD5 checksum: 229560 2577f1ecee02f71af34ca9aecbd70dd7
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_sparc.deb
Size/MD5 checksum: 110564 2eac357f311054279ef941a87befb62f
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_sparc.deb
Size/MD5 checksum: 232302 7691bd27595acd87249be24746f47186
These files will probably be moved into the stable distribution on its next update.
---------------------------------------------------------------------------
Debian Security Advisory DSA 570-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
October 20th, 2004 http://www.debian.org/security/faq
---------------------------------------------------------------------------
Package : libpng
Vulnerability : integer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0955
Several integer overflows have been discovered by its upstream developers in libpng, a commonly used library to display PNG graphics. They could be exploited to cause arbitrary code to be executed when a specially crafted PNG image is processed.
For the stable distribution (woody) this problem has been fixed in version 1.0.12-3.woody.9.
For the unstable distribution (sid) this problem has been fixed in version 1.0.15-8.
We recommend that you upgrade your libpng packages.
Upgrade Instructions
---------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
---------------------------------
Source archives:
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.dsc
Size/MD5 checksum: 580 7df7d1e0bbd2332551a14cc0a21dddf7
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.diff.gz
Size/MD5 checksum: 10396 dbf46963e7b26473fffba63a92791286
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12.orig.tar.gz
Size/MD5 checksum: 481387 3329b745968e41f6f9e55a4d04a4964c
Alpha architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_alpha.deb
Size/MD5 checksum: 130374 1044ec55646f8e94e218bf4613db1f60
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_alpha.deb
Size/MD5 checksum: 270440 74a5b9e3bc1b2fc2648133e196894b4f
ARM architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_arm.deb
Size/MD5 checksum: 109148 60e7475df4f824043242559b7d64322e
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_arm.deb
Size/MD5 checksum: 241496 f9ad072eb50a9391ce4b105eff9b2cba
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_i386.deb
Size/MD5 checksum: 107434 e81d90d93fc69329f1fc842666ab8bf2
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_i386.deb
Size/MD5 checksum: 227648 a5495e210300e511e7c265e86303c909
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_ia64.deb
Size/MD5 checksum: 147520 5292b0c17956697fa682a95be34abc0d
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_ia64.deb
Size/MD5 checksum: 271938 ae7b7fed469735915bbdf87ab02f80a3
HP Precision architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_hppa.deb
Size/MD5 checksum: 128830 b1937fc261ba66c8b69605c0f8df9305
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_hppa.deb
Size/MD5 checksum: 262630 be93d764c002923fb1e6d5385b12e200
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_m68k.deb
Size/MD5 checksum: 104172 86a18a750a19efbe94f8b79d9e4e89c8
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_m68k.deb
Size/MD5 checksum: 220804 d4b278997d86fe7cd824f2ad820a8466
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mips.deb
Size/MD5 checksum: 109184 b825d9e4e59ed06f5ff718d86c078714
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mips.deb
Size/MD5 checksum: 240698 883d442e57eef30ad86251ce2ffed701
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mipsel.deb
Size/MD5 checksum: 109102 eb85fee5ef0e9516372a7e245fd781ce
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mipsel.deb
Size/MD5 checksum: 240576 da9b75f48689e9277b8a053c014e8ddc
PowerPC architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_powerpc.deb
Size/MD5 checksum: 110504 b7ab6493588e05c09811e3f58fa747b2
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_powerpc.deb
Size/MD5 checksum: 234800 1e1bacb0bbe2d80166d4ce9f96348828
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_s390.deb
Size/MD5 checksum: 110520 29172e2fc592785d44b5779ed7787f08
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_s390.deb
Size/MD5 checksum: 229560 2577f1ecee02f71af34ca9aecbd70dd7
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_sparc.deb
Size/MD5 checksum: 110564 2eac357f311054279ef941a87befb62f
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_sparc.deb
Size/MD5 checksum: 232302 7691bd27595acd87249be24746f47186
These files will probably be moved into the stable distribution on its next update.