libpng: CVE-2006-5793: malformed sPLT chunks may blow away your browser

Related Vulnerabilities: CVE-2006-5793   CVE-2006-3334  

Debian Bug report logs - #398706
libpng: CVE-2006-5793: malformed sPLT chunks may blow away your browser

version graph

Reported by: Aníbal Monsalve Salazar <anibal@debian.org>

Date: Wed, 15 Nov 2006 07:48:11 UTC

Severity: grave

Tags: security

Found in version 1.2.8rel-7

Fixed in version libpng/1.2.13-0

Done: Anibal Monsalve Salazar <anibal@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Anibal Monsalve Salazar <anibal@debian.org>:
Bug#398706; Package libpng. (full text, mbox, link).


Acknowledgement sent to Aníbal Monsalve Salazar <anibal@debian.org>:
New Bug report received and forwarded. Copy sent to Anibal Monsalve Salazar <anibal@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Aníbal Monsalve Salazar <anibal@debian.org>
To: submit@bugs.debian.org
Subject: libpng: CVE-2006-5793: malformed sPLT chunks may blow away your browser
Date: Wed, 15 Nov 2006 18:41:03 +1100
[Message part 1 (text/plain, inline)]
Package: libpng
Severity: grave
Version: 1.2.8rel-7
Tags: security

There is a new security issue regarding malformed sPLT chunks.
The CVE project assigned CVE-2006-5793 for this bug.

Aníbal Monsalve Salazar
--
http://v7w.com/anibal
[signature.asc (application/pgp-signature, inline)]

Reply sent to Anibal Monsalve Salazar <anibal@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Aníbal Monsalve Salazar <anibal@debian.org>:
Bug acknowledged by developer. (full text, mbox, link).


Message #10 received at 398706-close@bugs.debian.org (full text, mbox, reply):

From: Anibal Monsalve Salazar <anibal@debian.org>
To: 398706-close@bugs.debian.org
Subject: Bug#398706: fixed in libpng 1.2.13-0
Date: Sat, 18 Nov 2006 15:32:25 -0800
Source: libpng
Source-Version: 1.2.13-0

We believe that the bug you reported is fixed in the latest version of
libpng, which is due to be installed in the Debian FTP archive:

libpng12-0-udeb_1.2.13-0_i386.udeb
  to pool/main/libp/libpng/libpng12-0-udeb_1.2.13-0_i386.udeb
libpng12-0_1.2.13-0_i386.deb
  to pool/main/libp/libpng/libpng12-0_1.2.13-0_i386.deb
libpng12-dev_1.2.13-0_i386.deb
  to pool/main/libp/libpng/libpng12-dev_1.2.13-0_i386.deb
libpng_1.2.13-0.diff.gz
  to pool/main/libp/libpng/libpng_1.2.13-0.diff.gz
libpng_1.2.13-0.dsc
  to pool/main/libp/libpng/libpng_1.2.13-0.dsc
libpng_1.2.13.orig.tar.gz
  to pool/main/libp/libpng/libpng_1.2.13.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 398706@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar <anibal@debian.org> (supplier of updated libpng package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 19 Nov 2006 09:02:09 +1100
Source: libpng
Binary: libpng12-dev libpng12-0 libpng12-0-udeb
Architecture: source i386
Version: 1.2.13-0
Distribution: unstable
Urgency: high
Maintainer: Anibal Monsalve Salazar <anibal@debian.org>
Changed-By: Anibal Monsalve Salazar <anibal@debian.org>
Description: 
 libpng12-0 - PNG library - runtime
 libpng12-0-udeb - PNG library - minimal runtime library (udeb)
 libpng12-dev - PNG library - development
Closes: 366070 369104 397892 398706
Changes: 
 libpng (1.2.13-0) unstable; urgency=high
 .
   * New upstream release.
   * CVE-2006-5793: Fixed a new security issue regarding malformed
     sPLT chunks. Closes: #398706.
   * Transitional package libpng3 is not shipped anymore.
     Closes: #369104.
 .
 libpng (1.2.12-0) unstable; urgency=high
 .
   * New upstream release. Closes: #366070.
   * CVE-2006-3334: Fixed Buffer overflow in the png_decompress_chunk
     function in pngrutil.c in libpng before 1.2.12 allows
     context-dependent attackers to cause a denial of service and
     possibly execute arbitrary code via unspecified vectors related
     to "chunk error processing," possibly involving the "chunk_name".
     Closes: #397892.
   * Removed debian/x86_patches/pnggccrd-PIC.patch as it's merged
     upstream.
Files: 
 14aa3a60b30c4747017065deecbe4925 694 libs optional libpng_1.2.13-0.dsc
 08b577ea037305024c4245fd19c29388 823594 libs optional libpng_1.2.13.orig.tar.gz
 ff7b693726a96905c2553817593e905d 13893 libs optional libpng_1.2.13-0.diff.gz
 a785e401a8806a468b3cdeb9bb0fe694 185372 libs optional libpng12-0_1.2.13-0_i386.deb
 04b7f3fa653f2e94888279bd2bfda4f0 171866 libdevel optional libpng12-dev_1.2.13-0_i386.deb
 2b400bf890ac647e85663cfa1edf37fd 67258 debian-installer extra libpng12-0-udeb_1.2.13-0_i386.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFFX5QQipBneRiAKDwRAif2AJ9Vl5iTHKlz35gYI9phmVdrXMTDBACfSJ/B
6hdJwIRPILPLbZh6/TwTXac=
=uY0l
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 24 Jun 2007 11:46:23 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:30:15 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.