Closed
Bug 161086
Opened 23 years ago
Closed 23 years ago
Another buffer overflow in libpng?
Categories
(Core :: Graphics: ImageLib, defect)
Core
Graphics: ImageLib
Tracking
()
VERIFIED
DUPLICATE
of bug 155222
People
(Reporter: BenB, Assigned: pavlov)
Details
- --------------------------------------------------------------------------
Debian Security Advisory DSA 140-2 security@debian.org
http://www.debian.org/security/ Martin Schulze
August 5th, 2002
- --------------------------------------------------------------------------
Package : libpng, libpng3
Vulnerability : Buffer overflow
Problem-Type : remote
Debian-specific: no
In addition to the advisory DSA 140-1 the packages below fix another
potential buffer overflow. The PNG libraries implement a safety
margin which is also included in a newer upstream release. Thanks to
Glenn Randers-Pehrson for informing us.
This problem has been fixed in version 1.0.12-3.woody.2 of libpng and
version 1.2.1-1.1.woody.2 of libpng3 for the current stable
distribution (woody).
We recommend that you upgrade your libpng packages.
---
Not enough information -> invalid.
Status: NEW → RESOLVED
Closed: 23 years ago
Resolution: --- → INVALID
Comment 2•23 years ago
|
||
It's a duplicate of bug #155222
Glenn
*** This bug has been marked as a duplicate of 155222 ***
Status: REOPENED → RESOLVED
Closed: 23 years ago → 23 years ago
Resolution: --- → DUPLICATE
Reporter | ||
Comment 5•23 years ago
|
||
No, this is not a dup, I am aware of the other bug. Note the "Another".
There is probably more information available in the Debian bug database and/or
CC-Cert and/or the bug database for libpng. I don't have the time (and
permission, in case of CERT?) to look it up - I just wanted to inform you.
Comment 6•23 years ago
|
||
I saw the "another" and it *is* a duplicate. We fixed two things in
libpng-1.2.4/1.0.14 last month and in Mozilla. Debian only fixed one,
and I reminded them about the other yesterday. They responded by submitting
this duplicate bug against Mozilla.
Glenn
You need to log in
before you can comment on or make changes to this bug.
Description
•