First published: Mon Jun 27 2011(Updated: )
It was reported [1] that the fix for <a href="https://access.redhat.com/security/cve/CVE-2004-0421">CVE-2004-0421</a> in libpng was inadvertently reverted during the 1.2.23 development cycle. The original flaw could be used to cause a denial of service via a carefully-crafted PNG image. This would affect all versions of libpng >=1.2.23, including 1.4.x and 1.5.x. [1] <a href="http://sourceforge.net/mailarchive/forum.php?thread_name=BANLkTikrnU6FJNQYFvwmt78hwpgKPVRd1Q%40mail.gmail.com&forum_name=png-mng-implement">http://sourceforge.net/mailarchive/forum.php?thread_name=BANLkTikrnU6FJNQYFvwmt78hwpgKPVRd1Q%40mail.gmail.com&forum_name=png-mng-implement</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libpng Libpng | >=1.5.0<1.5.4 | |
Libpng Libpng | >=1.4.0<1.4.8 | |
Libpng Libpng | >=1.2.0<1.2.45 | |
Libpng Libpng | >=1.0.0<1.0.55 | |
Fedoraproject Fedora | =14 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =6.0 | |
Canonical Ubuntu Linux | =10.10 | |
Canonical Ubuntu Linux | =11.04 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =8.04 | |
redhat/libpng | <1.4.8 | 1.4.8 |
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.617466
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.