-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2002.710 -- Debian Security Advisory DSA 213-1
                  New libpng packages fix buffer overflow
                             20 December 2002

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                libpng
                        libpng3
Vendor:                 Debian
Operating System:       Debian GNU/Linux 2.2
                        Debian GNU/Linux 3.0
                        Linux
Impact:                 Denial of Service
Access Required:        Remote

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 213-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
December 19th, 2002                     http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : libpng, libpng3
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2002-1363

Glenn Randers-Pehrson discovered a problem in connection with 16-bit
samples from libpng, an interface for reading and writing PNG
(Portable Network Graphics) format files.  The starting offsets for
the loops are calculated incorrectly which causes a buffer overrun
beyond the beginning of the row buffer.

For the current stable distribution (woody) this problem has been
fixed in version 1.0.12-3.woody.3 for libpng and in version
1.2.1-1.1.woody.3 for libpng3.

For the old stable distribution (potato) this problem has been fixed
in version 1.0.5-1.1 for libpng.  There are no other libpng packages.

For the unstable distribution (sid) this problem has been fixed in
version 1.0.12-7 for libpng and in version 1.2.5-8 for libpng3.

We recommend that you upgrade your libpng packages.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- - ---------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.5-1.1.dsc
      Size/MD5 checksum:      536 9ffdc9f0409f8c633a98f990b5de711e
    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.5-1.1.diff.gz
      Size/MD5 checksum:     7437 8fa1a097a9954cec5b9d3d1b5d0c8452
    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.5.orig.tar.gz
      Size/MD5 checksum:   299401 e8edc8c1ad4cb613f20563acd9112702

  Alpha architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.5-1.1_alpha.deb
      Size/MD5 checksum:   116406 dd2c8f175bab63876bc7b92b2dcd6c05
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.5-1.1_alpha.deb
      Size/MD5 checksum:   208052 a9d10119a2844b7bd458a13d0454a4f0

  ARM architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.5-1.1_arm.deb
      Size/MD5 checksum:    93146 30c73d5182f62be1a3bf49c856e0f2b7
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.5-1.1_arm.deb
      Size/MD5 checksum:   181912 ebd2d7f0a5a047e120ddcda389bfcc40

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.5-1.1_i386.deb
      Size/MD5 checksum:    93642 adaf7a70c5c96cc86dd37e3e97662749
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.5-1.1_i386.deb
      Size/MD5 checksum:   174272 55f53fa4fd4c4f4c56a9b6d89e466f21

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.5-1.1_m68k.deb
      Size/MD5 checksum:    89316 742095f437273c7289aef6360ea4d6c8
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.5-1.1_m68k.deb
      Size/MD5 checksum:   167102 36c31b242f0912d6bc56d4e5729a00b4

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.5-1.1_powerpc.deb
      Size/MD5 checksum:    94970 fbb5a56753334bb2b8d7bc7d2d398d74
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.5-1.1_powerpc.deb
      Size/MD5 checksum:   179638 51474277e15f2e1433cdbacddbe31951

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.5-1.1_sparc.deb
      Size/MD5 checksum:    95768 ccf30b2045949519216838dc548f065b
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.5-1.1_sparc.deb
      Size/MD5 checksum:   177530 58ba980f4f9522617896bfb2411c0e6c


Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.3.dsc
      Size/MD5 checksum:      579 c74a70217fad295e39dbcd9f91c27798
    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.3.diff.gz
      Size/MD5 checksum:     8222 cfd297d5a73b4945308fa63d6de12824
    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12.orig.tar.gz
      Size/MD5 checksum:   481387 3329b745968e41f6f9e55a4d04a4964c

    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3.dsc
      Size/MD5 checksum:      582 84306358085957c3e73f6edce0b01023
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3.diff.gz
      Size/MD5 checksum:     8602 a8560f3de1b5c30a97c4c74cf57bfa4a
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1.orig.tar.gz
      Size/MD5 checksum:   493105 75a21cbfae566158a0ac6d9f39087c4d

  Alpha architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_alpha.deb
      Size/MD5 checksum:   129824 ef01cd5ebaeabb1edd8b9cb411f536e7
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_alpha.deb
      Size/MD5 checksum:   270254 ca7ac90316d111e5fbb211445b15c08c
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_alpha.deb
      Size/MD5 checksum:   276366 027232e8a4c293b0ab4ff59a1a21317d
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_alpha.deb
      Size/MD5 checksum:   133226 cabc7adaf2228282a0585bd5339433ea

  ARM architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_arm.deb
      Size/MD5 checksum:   108294 2ef37013545787e20ad78922b0382a94
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_arm.deb
      Size/MD5 checksum:   241198 840d64491ca335c43efe1f11f378c9ff
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_arm.deb
      Size/MD5 checksum:   247452 5858106d712c5c3c9d6b54abf3e6d663
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_arm.deb
      Size/MD5 checksum:   111598 5ffa0998e3abe9b58a89a38b7117bfc7

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_i386.deb
      Size/MD5 checksum:   106734 aee84117c46174aa08e61f5c6b1a0f92
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_i386.deb
      Size/MD5 checksum:   227318 defd55edc6ec866586b9e321515048ea
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_i386.deb
      Size/MD5 checksum:   233106 6674671edd9b8e349d63eb900a0bddc7
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_i386.deb
      Size/MD5 checksum:   109870 b520c9348e5b354988120cef5a8e514d

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_ia64.deb
      Size/MD5 checksum:   146240 d65c17098de1668dd401cf53b9a4ec32
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_ia64.deb
      Size/MD5 checksum:   271438 b0d61c89269507d41af7f783c98d4622
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_ia64.deb
      Size/MD5 checksum:   278588 923b1157db9104ae3f78639a6030b3c5
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_ia64.deb
      Size/MD5 checksum:   150932 60902703eadffbc3cca6b85d6bee1ba6

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_hppa.deb
      Size/MD5 checksum:   128352 f4ab41d4228091d5872f7200c82aae38
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_hppa.deb
      Size/MD5 checksum:   262360 153afecfe0cb445d3d1885c1bad10d99
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_hppa.deb
      Size/MD5 checksum:   269428 2e5a45b68eb473065cca5d4728bdb255
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_hppa.deb
      Size/MD5 checksum:   132400 b78a44f965799da6bca84e8a2442807f

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_m68k.deb
      Size/MD5 checksum:   103330 8c24930d1488550c38ae5c312666b53c
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_m68k.deb
      Size/MD5 checksum:   220490 a64cea99028f39875bda8fff243b5cb4
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_m68k.deb
      Size/MD5 checksum:   226074 209d2f4d40de2316ff6e22f13158afd4
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_m68k.deb
      Size/MD5 checksum:   106322 0694cf5a572dabf9432984751793609b

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_mips.deb
      Size/MD5 checksum:   108408 babde9e03669d04e64f330e160a428da
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_mips.deb
      Size/MD5 checksum:   240380 e63d3a6c2d79c9cf2d516ded4fdbd86c
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_mips.deb
      Size/MD5 checksum:   246802 3a496e2fbee861e2332720c56154d422
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_mips.deb
      Size/MD5 checksum:   111788 7f193f85d15b95aca1d6f91b59a21de1

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_mipsel.deb
      Size/MD5 checksum:   108284 86165469fd2e759fa89920ef0f78c517
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_mipsel.deb
      Size/MD5 checksum:   240270 6865778b24bae9b165767d9a68b611ae
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_mipsel.deb
      Size/MD5 checksum:   246762 b435ec67b82c67ca49a1fae62e890143
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_mipsel.deb
      Size/MD5 checksum:   111704 101f3aba794a31b563ae21689df95e78

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_powerpc.deb
      Size/MD5 checksum:   109692 f83b2b0373ee54c4ddab81e02a2fa3bc
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_powerpc.deb
      Size/MD5 checksum:   234364 cceab4d763baead38e33c1191bb77f88
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_powerpc.deb
      Size/MD5 checksum:   240364 1c6423ea77320e71cfa1c861f2ff3e0f
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_powerpc.deb
      Size/MD5 checksum:   112736 4ac7fd36101c7cfbf388ad0bbe8b8d73

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_s390.deb
      Size/MD5 checksum:   107434 671e55d0474ddf881f13055a1197cbb1
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_s390.deb
      Size/MD5 checksum:   226536 706f5ed4934fe1a699164fe3237e3e95
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_s390.deb
      Size/MD5 checksum:   232394 dec9877641f0982131adcdc9b207e12e
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_s390.deb
      Size/MD5 checksum:   110896 57c1d8704aa9d0af5bda68ef569c39e9

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.3_sparc.deb
      Size/MD5 checksum:   109806 6441ca6b206335e7f2de615c7fb52ef7
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.3_sparc.deb
      Size/MD5 checksum:   231856 d9d2fb80736b7b5c012c58fb87b7a130
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.3_sparc.deb
      Size/MD5 checksum:   237666 a503daffff60d0ee17bd30f4ca0b512a
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.3_sparc.deb
      Size/MD5 checksum:   113206 5d1fffdac908d6ac7f56d609ea723485


  These files will probably be moved into the stable distribution on
  its next revision.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE+AdtAW5ql+IAeqTIRAneBAJ4geoMYVOT8IEIaneMogwxUw1SQvQCffCTJ
HKD+rXrIZO71IM+iRtF6DC0=
=aalf
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBPgLouih9+71yA2DNAQEDKwQAhDhP0bhCkgb+2j4XNy76a3mxL8McXF96
9jSIYuvrw3ZL4Gg009EpnRFQehyu4aUH2NiqSlZMBY2mV1zDrU1BqhpPG4XqHhFC
BT/qX9Xp3jr84sJdhREPAWfof1gt40wk4Tn720tDTC+jkEdK/jeEiaj57t3mUzaE
y4tOqtG+X2w=
=9qZ3
-----END PGP SIGNATURE-----