SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   libpng Vendors:   libpng.sourceforge.net
(Debian Issues Fix) libpng Buffer Offset Calculation Overflow May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1010874
SecurityTracker URL:  http://securitytracker.com/id/1010874
CVE Reference:   CAN-2004-0768   (Links to External Site)
Date:  Aug 5 2004
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Prior to 1.2.6rc1, 1.0.16rc1
Description:   A buffer overflow vulnerability was reported in libpng. A remote user may be able to cause arbitrary code to be executed by an application using libpng.

The vendor reported that libpng contains a buffer overflow vulnerability similar to that reported in CVE CAN-2002-1363. The software does not properly calculate buffer offsets, which may allow for remote code execution.

The vendor has indicate that this flaw is "quite serious."

Impact:   A remote or local user may be able to cause arbitrary code to be executed by an application using libpng. The specific impact depends on the application using libpng.
Solution:   Debian has released a fix for the current stable distribution (woody) in libpng3 version 1.2.1-1.1.woody.7 and libpng version 1.0.12-3.woody.7.

Debian GNU/Linux 3.0 alias woody:

Source archives:

http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.7.dsc
Size/MD5 checksum: 579 28fa419216a24ee3bfc2379864cb08af
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.7.diff.gz
Size/MD5 checksum: 9742 75a375a67bb78301d9a9ebe821b3f2b2
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12.orig.tar.gz
Size/MD5 checksum: 481387 3329b745968e41f6f9e55a4d04a4964c
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7.dsc
Size/MD5 checksum: 583 3976057544097db61b33f953b803d947
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7.diff.gz
Size/MD5 checksum: 29676 0501708a687b71e449f81cd3e61868d6
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1.orig.tar.gz
Size/MD5 checksum: 493105 75a21cbfae566158a0ac6d9f39087c4d

ARM architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_arm.deb
Size/MD5 checksum: 108834 65c7d7fb818332e8c0a5948450289d6f
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_arm.deb
Size/MD5 checksum: 241392 785d7cc63274c17c1b6f54020e55b047
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_arm.deb
Size/MD5 checksum: 247654 8fcf3de4c503230ec009cd60d852ed8e
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_arm.deb
Size/MD5 checksum: 112036 159d56f98ca67efae5b941c8c125f7fb

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_i386.deb
Size/MD5 checksum: 107012 6c0c53769987b0e612315a27d426c31b
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_i386.deb
Size/MD5 checksum: 226982 93ab2de59fd31cdd270220a9bf470aab
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_i386.deb
Size/MD5 checksum: 233652 7a723facf934ca726426fcccbea044c1
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_i386.deb
Size/MD5 checksum: 110350 aaa13f7b82894d332b0d93812eccf245

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_ia64.deb
Size/MD5 checksum: 147182 a42677c2dc15d9c7e69084c794adb1f1
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_ia64.deb
Size/MD5 checksum: 271760 3602ac433e9acb291264ac4631466b1b
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_ia64.deb
Size/MD5 checksum: 278832 f40345e28c0a8090e3d5cc0da0c47c83
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_ia64.deb
Size/MD5 checksum: 151492 b4cf01f0f5a4584a9cc91d37059e3a18

HP Precision architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_hppa.deb
Size/MD5 checksum: 128592 c290efcf7bca64a59b95df9bd40ea7c4
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_hppa.deb
Size/MD5 checksum: 262498 bba030d36b2453f50fc5f8dd502193db
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_hppa.deb
Size/MD5 checksum: 269714 97f2cc65b004d72d2f736c444a5eca02
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_hppa.deb
Size/MD5 checksum: 132710 ad103af06ba1fd04bfc820a7c9469a04

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_m68k.deb
Size/MD5 checksum: 103914 0397515db7b83fe0788c11878ff2f6fe
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_m68k.deb
Size/MD5 checksum: 220716 eedf1c5c86848604fffc678e2522047e
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_m68k.deb
Size/MD5 checksum: 226396 825cf323e0b2a20d7059b41ac50b5ffe
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_m68k.deb
Size/MD5 checksum: 106862 c9426ed19e5cf9d5ffa3f4e5ad9575ba

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_mips.deb
Size/MD5 checksum: 108912 f28b7b28829c5eccfc1879bf24f30d01
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_mips.deb
Size/MD5 checksum: 240572 aa9f0be614c9b9e83035927bca2780a0
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_mips.deb
Size/MD5 checksum: 247046 950eb986e2da18540cac6871fa724ec8
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_mips.deb
Size/MD5 checksum: 112238 45ba391f6604228a5712b3933cd7918d

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_mipsel.deb
Size/MD5 checksum: 108792 e1c23a58af661142d961b2cb9067a8ad
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_mipsel.deb
Size/MD5 checksum: 240484 205b79c80e9d5a90ba39ce297ca7ccf9
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_mipsel.deb
Size/MD5 checksum: 247000 d7fab207f6240fa1c8cca2b626543910
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_mipsel.deb
Size/MD5 checksum: 112174 60c7d64b2256f05f8eb132b8e386731e

PowerPC architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_powerpc.deb
Size/MD5 checksum: 110254 ed1c9f3cb6cfc64467ae83251beb8b2d
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_powerpc.deb
Size/MD5 checksum: 234680 a728d61a234b60b14d6876c0d7d460b5
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_powerpc.deb
Size/MD5 checksum: 240742 ae4b57d50f8f6e8f88f18fdfde81c9a8
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_powerpc.deb
Size/MD5 checksum: 113340 3014018db3169c617d958b71fa0e119d

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_s390.deb
Size/MD5 checksum: 110286 1ba753d363eb45b3b768ae26ce19f9dc
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_s390.deb
Size/MD5 checksum: 229436 8ca7796466613d780a3442d831544bf9
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_s390.deb
Size/MD5 checksum: 235056 dcfc35ced743c453935dea5f4c6e8b92
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_s390.deb
Size/MD5 checksum: 113376 2a42876c22f968ae435382110d27741c

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_sparc.deb
Size/MD5 checksum: 110312 f5db28252e4072d07f34da1b57bb2656
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_sparc.deb
Size/MD5 checksum: 232132 32be4f2a4f7215f3760ac6ce7c222ab9
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_sparc.deb
Size/MD5 checksum: 237786 2d36e99aab38db959088a646bbf9455b
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_sparc.deb
Size/MD5 checksum: 113744 d67df8af224bbcb817c7cb004ece5bf7

Vendor URL:  www.libpng.org/pub/png/libpng.html (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Debian)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 5 2004 libpng Buffer Offset Calculation Overflow May Let Remote Users Execute Arbitrary Code



 Source Message Contents

Date:  Wed, 4 Aug 2004 19:10:24 -0700
Subject:  [SECURITY] [DSA 536-1] New libpng, libpng3 packages fix multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 536-1                     security@debian.org
http://www.debian.org/security/                             Matt Zimmerman
August 4th, 2004                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : libpng
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE Ids        : CAN-2004-0597 CAN-2004-0598 CAN-2004-0599 CAN-2004-0768

Chris Evans discovered several vulnerabilities in libpng:

 CAN-2004-0597 - Multiple buffer overflows exist, including when
 handling transparency chunk data, which could be exploited to cause
 arbitrary code to be executed when a specially crafted PNG image is
 processed

 CAN-2004-0598 - Multiple NULL pointer dereferences in
 png_handle_iCPP() and elsewhere could be exploited to cause an
 application to crash when a specially crafted PNG image is processed

 CAN-2004-0599 - Multiple integer overflows in png_handle_sPLT(),
 png_read_png() nctions and elsewhere could be exploited to cause an
 application to crash, or potentially arbitrary code to be executed,
 when a specially crafted PNG image is processed

In addition, a bug related to CAN-2002-1363 was fixed:

 CAN-2004-0768 - A buffer overflow could be caused by incorrect
 calculation of buffer offsets, possibly leading to the execution of
 arbitrary code

For the current stable distribution (woody), these problems have been
fixed in libpng3 version 1.2.1-1.1.woody.7 and libpng version
1.0.12-3.woody.7.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you update your libpng and libpng3 packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.7.dsc
      Size/MD5 checksum:      579 28fa419216a24ee3bfc2379864cb08af
    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.7.diff.gz
      Size/MD5 checksum:     9742 75a375a67bb78301d9a9ebe821b3f2b2
    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12.orig.tar.gz
      Size/MD5 checksum:   481387 3329b745968e41f6f9e55a4d04a4964c
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7.dsc
      Size/MD5 checksum:      583 3976057544097db61b33f953b803d947
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7.diff.gz
      Size/MD5 checksum:    29676 0501708a687b71e449f81cd3e61868d6
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1.orig.tar.gz
      Size/MD5 checksum:   493105 75a21cbfae566158a0ac6d9f39087c4d

  ARM architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_arm.deb
      Size/MD5 checksum:   108834 65c7d7fb818332e8c0a5948450289d6f
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_arm.deb
      Size/MD5 checksum:   241392 785d7cc63274c17c1b6f54020e55b047
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_arm.deb
      Size/MD5 checksum:   247654 8fcf3de4c503230ec009cd60d852ed8e
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_arm.deb
      Size/MD5 checksum:   112036 159d56f98ca67efae5b941c8c125f7fb

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_i386.deb
      Size/MD5 checksum:   107012 6c0c53769987b0e612315a27d426c31b
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_i386.deb
      Size/MD5 checksum:   226982 93ab2de59fd31cdd270220a9bf470aab
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_i386.deb
      Size/MD5 checksum:   233652 7a723facf934ca726426fcccbea044c1
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_i386.deb
      Size/MD5 checksum:   110350 aaa13f7b82894d332b0d93812eccf245

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_ia64.deb
      Size/MD5 checksum:   147182 a42677c2dc15d9c7e69084c794adb1f1
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_ia64.deb
      Size/MD5 checksum:   271760 3602ac433e9acb291264ac4631466b1b
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_ia64.deb
      Size/MD5 checksum:   278832 f40345e28c0a8090e3d5cc0da0c47c83
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_ia64.deb
      Size/MD5 checksum:   151492 b4cf01f0f5a4584a9cc91d37059e3a18

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_hppa.deb
      Size/MD5 checksum:   128592 c290efcf7bca64a59b95df9bd40ea7c4
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_hppa.deb
      Size/MD5 checksum:   262498 bba030d36b2453f50fc5f8dd502193db
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_hppa.deb
      Size/MD5 checksum:   269714 97f2cc65b004d72d2f736c444a5eca02
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_hppa.deb
      Size/MD5 checksum:   132710 ad103af06ba1fd04bfc820a7c9469a04

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_m68k.deb
      Size/MD5 checksum:   103914 0397515db7b83fe0788c11878ff2f6fe
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_m68k.deb
      Size/MD5 checksum:   220716 eedf1c5c86848604fffc678e2522047e
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_m68k.deb
      Size/MD5 checksum:   226396 825cf323e0b2a20d7059b41ac50b5ffe
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_m68k.deb
      Size/MD5 checksum:   106862 c9426ed19e5cf9d5ffa3f4e5ad9575ba

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_mips.deb
      Size/MD5 checksum:   108912 f28b7b28829c5eccfc1879bf24f30d01
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_mips.deb
      Size/MD5 checksum:   240572 aa9f0be614c9b9e83035927bca2780a0
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_mips.deb
      Size/MD5 checksum:   247046 950eb986e2da18540cac6871fa724ec8
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_mips.deb
      Size/MD5 checksum:   112238 45ba391f6604228a5712b3933cd7918d

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_mipsel.deb
      Size/MD5 checksum:   108792 e1c23a58af661142d961b2cb9067a8ad
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_mipsel.deb
      Size/MD5 checksum:   240484 205b79c80e9d5a90ba39ce297ca7ccf9
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_mipsel.deb
      Size/MD5 checksum:   247000 d7fab207f6240fa1c8cca2b626543910
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_mipsel.deb
      Size/MD5 checksum:   112174 60c7d64b2256f05f8eb132b8e386731e

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_powerpc.deb
      Size/MD5 checksum:   110254 ed1c9f3cb6cfc64467ae83251beb8b2d
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_powerpc.deb
      Size/MD5 checksum:   234680 a728d61a234b60b14d6876c0d7d460b5
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_powerpc.deb
      Size/MD5 checksum:   240742 ae4b57d50f8f6e8f88f18fdfde81c9a8
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_powerpc.deb
      Size/MD5 checksum:   113340 3014018db3169c617d958b71fa0e119d

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_s390.deb
      Size/MD5 checksum:   110286 1ba753d363eb45b3b768ae26ce19f9dc
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_s390.deb
      Size/MD5 checksum:   229436 8ca7796466613d780a3442d831544bf9
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_s390.deb
      Size/MD5 checksum:   235056 dcfc35ced743c453935dea5f4c6e8b92
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_s390.deb
      Size/MD5 checksum:   113376 2a42876c22f968ae435382110d27741c

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.7_sparc.deb
      Size/MD5 checksum:   110312 f5db28252e4072d07f34da1b57bb2656
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.7_sparc.deb
      Size/MD5 checksum:   232132 32be4f2a4f7215f3760ac6ce7c222ab9
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.7_sparc.deb
      Size/MD5 checksum:   237786 2d36e99aab38db959088a646bbf9455b
    http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.7_sparc.deb
      Size/MD5 checksum:   113744 d67df8af224bbcb817c7cb004ece5bf7

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBEZb5ArxCt0PiXR4RAmUfAJ4sqTIviuQbDq3Z/OihWgW3R+X9IACdHPeV
ZYzTM1+5xJbhNlRCOnSvfrQ=
=q7t4
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC