lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040805105058.GA30106@tsunami.trustix.net>
Date: Thu, 5 Aug 2004 12:50:58 +0200
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2004-0040 - libpng


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0040

Package name:      libpng
Summary:           Several security holes
Date:              2004-08-05
Affected versions: Trustix Secure Linux 2.0
                   Trustix Secure Linux 2.1
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  libpng is a library of functions for creating and manipulating PNG
  (Portable Network Graphics) image format files.

Problem description:
  
  This update fixed the following security vulnerabilities:

  CAN-2004-0597 - Multiple buffer overflows exist, including when
  handling transparency chunk data, which could be exploited to cause
  arbitrary code to be executed when a specially crafted PNG image is
  processed

  CAN-2004-0598 - Multiple NULL pointer dereferences in
  png_handle_iCPP() and elsewhere could be exploited to cause an
  application to crash when a specially crafted PNG image is processed

  CAN-2004-0599 - Multiple integer overflows in png_handle_sPLT(),
  png_read_png() nctions and elsewhere could be exploited to cause an
  application to crash, or potentially arbitrary code to be executed,
  when a specially crafted PNG image is processed

  CAN-2004-0768 - A buffer overflow could be caused by incorrect
  calculation of buffer offsets, possibly leading to the execution of
  arbitrary code 

  Some of these problems was also fixed in our earier releases, this
  update includes an all in one patch that covers them all.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Public testing:
  Most updates for Trustix Secure Linux are made available for public
  testing some time before release.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://tsldev.trustix.org/horizon/>

  You may also use swup for public testing of updates:
  
  site {
      class = 0
      location = "http://tsldev.trustix.org/horizon/rdfs/latest.rdf"
      regexp = ".*"
  }
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.0/> and
  <URI:http://www.trustix.org/errata/trustix-2.1/>
  or directly at
  <URI:http://www.trustix.org/errata/2004/0040>


MD5sums of the packages:
- --------------------------------------------------------------------------
2a916c1321aa5ff7fc380a41d1e69baa  2.0/rpms/libpng12-1.2.5-7tr.i586.rpm
dd28a857f30742276d5f5bb7ecdcdcb4  2.0/rpms/libpng12-devel-1.2.5-7tr.i586.rpm
7eeb7a4c22eb2007875c15e8e8024532  2.1/rpms/libpng-1.2.5-12tr.i586.rpm
2e6f72b81df71febbac21e361c26b913  2.1/rpms/libpng-devel-1.2.5-12tr.i586.rpm
87e50d10fd56dde63f645dd1a40d9f95  2.1/rpms/libpng-tools-1.2.5-12tr.i586.rpm
bc659bbb35dd41574729215f49eed2bc  e2/libpng-1.2.5-12tr.i586.rpm
2b0b50f466ef4171ecf9e8e591aa174f  e2/libpng-devel-1.2.5-12tr.i586.rpm
b03755eb3a750f8a4b333b312514061e  e2/libpng-tools-1.2.5-12tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBEhAdi8CEzsK9IksRApj1AJ9GsKxQiJjwLWtaSRsxlPeTkqcewACgkD99
ZVos/TC0WB1kw7hSlon8Kvg=
=8HDZ
- -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBEhC+i8CEzsK9IksRAuwIAJ0ZcuG9XA5dgt7oTqzauKwiioGPpACfXo29
dCKU2hxH3X/rdrD4M+JrSrQ=
=4LdN
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ