lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20090306022522.GD8444@severus.strandboge.com>
Date: Thu, 5 Mar 2009 20:25:22 -0600
From: Jamie Strandboge <jamie@...onical.com>
To: ubuntu-security-announce@...ts.ubuntu.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [USN-730-1] libpng vulnerabilities

===========================================================
Ubuntu Security Notice USN-730-1             March 06, 2009
libpng vulnerabilities
CVE-2007-5268, CVE-2007-5269, CVE-2008-1382, CVE-2008-3964,
CVE-2008-5907, CVE-2009-0040
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libpng12-0                      1.2.8rel-5ubuntu0.4

Ubuntu 7.10:
  libpng12-0                      1.2.15~beta5-2ubuntu0.2

Ubuntu 8.04 LTS:
  libpng12-0                      1.2.15~beta5-3ubuntu0.1

Ubuntu 8.10:
  libpng12-0                      1.2.27-1ubuntu0.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

It was discovered that libpng did not properly perform bounds checking in
certain operations. An attacker could send a specially crafted PNG image and
cause a denial of service in applications linked against libpng. This issue
only affected Ubuntu 8.04 LTS. (CVE-2007-5268, CVE-2007-5269)

Tavis Ormandy discovered that libpng did not properly initialize memory. If a
user or automated system were tricked into opening a crafted PNG image, an
attacker could cause a denial of service via application crash, or possibly
execute arbitrary code with the privileges of the user invoking the program.
This issue did not affect Ubuntu 8.10. (CVE-2008-1382)

Harald van Dijk discovered an off-by-one error in libpng. An attacker could
could cause an application crash in programs using pngtest. (CVE-2008-3964)

It was discovered that libpng did not properly NULL terminate a keyword
string. An attacker could exploit this to set arbitrary memory locations to
zero. (CVE-2008-5907)

Glenn Randers-Pehrson discovered that libpng did not properly initialize
pointers. If a user or automated system were tricked into opening a crafted PNG
file, an attacker could cause a denial of service or possibly execute arbitrary
code with the privileges of the user invoking the program. (CVE-2009-0040)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5ubuntu0.4.diff.gz
      Size/MD5:    19735 949fd37fe873e65120c79ed7d120f05d
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5ubuntu0.4.dsc
      Size/MD5:      660 7280857d5c44750737addb4adafee14f
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel.orig.tar.gz
      Size/MD5:   510681 cac1512878fb98f2456df6dc50bc9bc7

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.8rel-5ubuntu0.4_all.deb
      Size/MD5:      842 21ee9c16fc1f3dbf732f0040ad75c850

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.4_amd64.deb
      Size/MD5:   114308 fe9a7e7c5a252631f93f18952d409b86
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.4_amd64.deb
      Size/MD5:   247658 62cab067f6e85d0be7b307eeebaa55c9
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.4_amd64.udeb
      Size/MD5:    69562 9a979f0d9dc9604e4833aa0b61ff7376

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.4_i386.deb
      Size/MD5:   111862 9d4675aaaa3ec2aacda34e041925c1df
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.4_i386.deb
      Size/MD5:   239802 566beec7a8d8e24eb94af2cb14686078
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.4_i386.udeb
      Size/MD5:    67038 717ec3d7283059720ba0525afc79dcee

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.4_powerpc.deb
      Size/MD5:   111296 9aff23cce92553dcc297553693c64ef9
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.4_powerpc.deb
      Size/MD5:   245356 b978fb399c02e38e2868a6c29e4f4d59
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.4_powerpc.udeb
      Size/MD5:    66412 534a8b169f6f7ffc912c93a1b48feb79

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.4_sparc.deb
      Size/MD5:   108980 00944b4687ef379d1c925de99c7d3768
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.4_sparc.deb
      Size/MD5:   240216 f4213ee280f7a2c78f49f7d94935db3a
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.4_sparc.udeb
      Size/MD5:    63956 812497bdce1af5d973adb0bec8393d1f

Updated packages for Ubuntu 7.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-2ubuntu0.2.diff.gz
      Size/MD5:    17802 70234c0a016f95a680d330c00ed767a6
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-2ubuntu0.2.dsc
      Size/MD5:      831 aea067d70d037e161b02c7c84b8d43b6
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5.orig.tar.gz
      Size/MD5:   829038 77ca14fcee1f1f4daaaa28123bd0b22d

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.15~beta5-2ubuntu0.2_all.deb
      Size/MD5:      940 89445701e08689929173dbcfe576927d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_amd64.deb
      Size/MD5:   190298 d354b4581a09da60028363e65bd6216e
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_amd64.deb
      Size/MD5:   180236 8954535c44eea6dd4baae6fd411c76e9
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_amd64.udeb
      Size/MD5:    70894 b761c5fd1a687cfcfdc5f6a803afee2a

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_i386.deb
      Size/MD5:   187974 031dc9442d58ec1e3e3e42fa7e4e29e4
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_i386.deb
      Size/MD5:   171708 0f48e6210f770b3e1b7f59b5bf304367
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_i386.udeb
      Size/MD5:    68572 e1d4bc8c516b2fda0d0b088d43a82091

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_lpia.deb
      Size/MD5:   189454 6f27e35bdd3dc73695ab71f4517ed8b2
    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_lpia.deb
      Size/MD5:   173028 72c1b29825a4c0ee25c1407889c4016c
    http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_lpia.udeb
      Size/MD5:    70068 52246adc26148761838da10a1278f9ff

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_powerpc.deb
      Size/MD5:   190168 bc69e2994b102798ebdbc4d2a3906a4f
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_powerpc.deb
      Size/MD5:   179394 98809f9342fbe95ee5555bda740dd030
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_powerpc.udeb
      Size/MD5:    70800 c0c6648842083bc20f7675434a4d401c

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-2ubuntu0.2_sparc.deb
      Size/MD5:   185868 720a9587db72bc63364e541d202bb869
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-2ubuntu0.2_sparc.deb
      Size/MD5:   173900 a2a9049485552ac8247e709b67d941b5
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-2ubuntu0.2_sparc.udeb
      Size/MD5:    66478 7189e57d035d8e4ebf1985bd00b59514

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-3ubuntu0.1.diff.gz
      Size/MD5:    18391 2a9f35d6f7a69fcce36ad8704b26d2e4
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-3ubuntu0.1.dsc
      Size/MD5:      831 32b7c81ffbe2d2957fbff29f93882e25
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5.orig.tar.gz
      Size/MD5:   829038 77ca14fcee1f1f4daaaa28123bd0b22d

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.15~beta5-3ubuntu0.1_all.deb
      Size/MD5:      946 c0ca5a7e2bb96aeb13fcaba011b15f38

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_amd64.deb
      Size/MD5:   189930 0a87561a09fdfea1544aae798bff51ad
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_amd64.deb
      Size/MD5:   179762 a9f4e4d4a85afcff685323c4fdcb80fe
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_amd64.udeb
      Size/MD5:    70556 4c076824555bef85baed162f08afdf90

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_i386.deb
      Size/MD5:   188652 215fc54ddc5a153950ba26d3a42d3193
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_i386.deb
      Size/MD5:   171394 376f39d2780a371e9660be083a27a49d
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_i386.udeb
      Size/MD5:    69226 15b50ce121ae872dd58bdb1d2e0da902

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_lpia.deb
      Size/MD5:   189542 f126365ada9df2ea731b37e0d3d76969
    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_lpia.deb
      Size/MD5:   173074 2c1b02af288a645f3b2ce46d636b3559
    http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_lpia.udeb
      Size/MD5:    70150 94bbd92c0f9cc566828b3c0b617e24c0

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_powerpc.deb
      Size/MD5:   190084 c66c468c68c890154e569caa528d4b40
    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_powerpc.deb
      Size/MD5:   179312 be7f41fdd449790ac525b5b6807815dc
    http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_powerpc.udeb
      Size/MD5:    70684 56de9c4a7a91494cfc0dc6c5c0da1f0b

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-3ubuntu0.1_sparc.deb
      Size/MD5:   185524 5706a2b50c7b44fbcec990c2b2943a0d
    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-3ubuntu0.1_sparc.deb
      Size/MD5:   173530 2dd22cb07e4d21c95635870988bd9eab
    http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-3ubuntu0.1_sparc.udeb
      Size/MD5:    66092 2ec57ae777558f2dc23208a128f57d23

Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.27-1ubuntu0.1.diff.gz
      Size/MD5:    15925 8a163f2089f6ef8d6c571cbf0eda1512
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.27-1ubuntu0.1.dsc
      Size/MD5:     1292 206c905aeb49ddf0d5004e0afaf92318
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.27.orig.tar.gz
      Size/MD5:   783204 13a0de401db1972a8e68f47d5bdadd13

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.27-1ubuntu0.1_all.deb
      Size/MD5:      934 f4ead7835d85d0571a3fa097a0e63280

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_amd64.deb
      Size/MD5:   168260 3a049b2b432ef4d52394956cd3b491b1
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_amd64.deb
      Size/MD5:   255486 2b6865706eac275b1360549f3050fcc1
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_amd64.udeb
      Size/MD5:    72834 c3309534ad5322fa6e222299c4da0b3a

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_i386.deb
      Size/MD5:   166646 2160adb734db90aaf388c3398858ebd3
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_i386.deb
      Size/MD5:   247706 7b263a5d14791fa5c2c4ed464fea3db8
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_i386.udeb
      Size/MD5:    71172 7e3050071f423115e422375d2d549271

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_lpia.deb
      Size/MD5:   167104 9ecff527d2a71d2622c3b49b2e3e622f
    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_lpia.deb
      Size/MD5:   248668 379bce13e320ebbd6504e113eeb11db8
    http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_lpia.udeb
      Size/MD5:    71534 257601cfb129ad1c21aff4e213beec86

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_powerpc.deb
      Size/MD5:   167230 75ecf79cc491d5b8ecec24a186ed8051
    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_powerpc.deb
      Size/MD5:   254330 d327a222704cd603864abdee0805ecea
    http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_powerpc.udeb
      Size/MD5:    71718 9d879660f32c45280d083433b189023e

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-0_1.2.27-1ubuntu0.1_sparc.deb
      Size/MD5:   162274 4e6ed662532e8d69da8e14e120034427
    http://ports.ubuntu.com/pool/main/libp/libpng/libpng12-dev_1.2.27-1ubuntu0.1_sparc.deb
      Size/MD5:   248262 91d8537dad0e04ac5abc362d5222cc3d
    http://ports.ubuntu.com/pool/universe/libp/libpng/libpng12-0-udeb_1.2.27-1ubuntu0.1_sparc.udeb
      Size/MD5:    66920 351736652216f25fb7fc8d61b68cb773



Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

-- 
ubuntu-security-announce mailing list
ubuntu-security-announce@...ts.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ