---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Ubuntu update for libpng SECUNIA ADVISORY ID: SA22951 VERIFY ADVISORY: http://secunia.com/advisories/22951/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 5.10 http://secunia.com/product/6606/ Ubuntu Linux 6.06 http://secunia.com/product/10611/ Ubuntu Linux 6.10 http://secunia.com/product/12470/ DESCRIPTION: Ubuntu has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA22900 SOLUTION: Apply updated packages. -- Ubuntu 5.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.0.18-1ubuntu3.1.diff.gz Size/MD5: 12960 3ae9ff536ba163efc00070487687399b http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.0.18-1ubuntu3.1.dsc Size/MD5: 636 3af55a46b4ada05160527a49c5dd6671 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.0.18.orig.tar.gz Size/MD5: 506181 40081bdc82e4c6cf782553cd5aa8d9d8 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng2-dev_1.0.18-1ubuntu3.1_all.deb Size/MD5: 1166 160ce752a119a735d2abf03ec1f1dd55 http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng2_1.0.18-1ubuntu3.1_all.deb Size/MD5: 942 e3c40272cd978953acf3469dbda42a30 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng10-0_1.0.18-1ubuntu3.1_amd64.deb Size/MD5: 113890 e395ef9909e34cc4333fb868a7a794f2 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng10-dev_1.0.18-1ubuntu3.1_amd64.deb Size/MD5: 197710 1b46e5c7e431d6640e319ca81f0634ad i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng10-0_1.0.18-1ubuntu3.1_i386.deb Size/MD5: 109224 e083cb785e2bc0225b47fee51c69b22b http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng10-dev_1.0.18-1ubuntu3.1_i386.deb Size/MD5: 186536 476d8276b05d075552fc878547a17092 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng10-0_1.0.18-1ubuntu3.1_powerpc.deb Size/MD5: 111444 cda22be3ef3d978e4aa3c7111c7f7436 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng10-dev_1.0.18-1ubuntu3.1_powerpc.deb Size/MD5: 196744 db0ae3294f47addab0ff52b4d134fff8 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng10-0_1.0.18-1ubuntu3.1_sparc.deb Size/MD5: 109078 26672912dc8d37ae7afbc57fba8cc477 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng10-dev_1.0.18-1ubuntu3.1_sparc.deb Size/MD5: 192902 458ef029777b12b5b4165e63d097c774 -- Ubuntu 6.06 LTS -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5ubuntu0.1.diff.gz Size/MD5: 16308 c13ba4eb92c046153c73cec343ba0dad http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5ubuntu0.1.dsc Size/MD5: 652 ec80abc5bbe3fb9593374a6df3e5351d http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel.orig.tar.gz Size/MD5: 510681 cac1512878fb98f2456df6dc50bc9bc7 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.8rel-5ubuntu0.1_all.deb Size/MD5: 842 db0b015e80f042a3311152aad1a1f96f amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.1_amd64.udeb Size/MD5: 69468 8c741fd0d0ff83068e6dd78bc2e026c1 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.1_amd64.deb Size/MD5: 113808 c86b5b27effab5f974f4f2c4ce743515 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.1_amd64.deb Size/MD5: 247500 6493fda0d94d75f2255cb48399fa5fec i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.1_i386.udeb Size/MD5: 66918 38259ac6fd9f0b4fc56e59b9b8fa75e4 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.1_i386.deb Size/MD5: 111304 440e23028cc1c9de3fb459f8969641d5 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.1_i386.deb Size/MD5: 239650 0235a7988ea235573758fd45a7500cf9 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.1_powerpc.udeb Size/MD5: 66284 ba2f362738e47667364a69a7425a4bae http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.1_powerpc.deb Size/MD5: 110738 27426cfb75acb15305d71a26d79ecf70 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.1_powerpc.deb Size/MD5: 245228 297d5a07d22ea0c2deb1e3a2da22cc7d sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.1_sparc.udeb Size/MD5: 63820 b28e9240844c87f288986efcfaa6d82b http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.1_sparc.deb Size/MD5: 108438 439feb51a430e75b0314ebd0bbe9eeaf http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.1_sparc.deb Size/MD5: 240068 f1d19c0623d6a875c240ae809f39cc37 -- Ubuntu 6.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5.1ubuntu0.1.diff.gz Size/MD5: 16419 341fce97b60457776d7d5b3045e98ab8 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5.1ubuntu0.1.dsc Size/MD5: 659 128223fd1ee1485c1edda30965e2c638 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel.orig.tar.gz Size/MD5: 510681 cac1512878fb98f2456df6dc50bc9bc7 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.8rel-5.1ubuntu0.1_all.deb Size/MD5: 884 ff80da62782949d9ee6e2f45de7368d8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5.1ubuntu0.1_amd64.udeb Size/MD5: 68974 410bb02f1680b74c0b7bdfe75b6d4f6c http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5.1ubuntu0.1_amd64.deb Size/MD5: 113470 595b09232667d5f45bfc94cbac2154e4 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5.1ubuntu0.1_amd64.deb Size/MD5: 247126 af29f417517106cf651dab5c92ad52ee i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5.1ubuntu0.1_i386.udeb Size/MD5: 69914 d335eae45c97a06251e2b1bb263a0f78 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5.1ubuntu0.1_i386.deb Size/MD5: 114466 eb4ebc44ac004eddd4ac551f443d9196 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5.1ubuntu0.1_i386.deb Size/MD5: 242864 a79b348098a3e5051a93dcc3bfc44f80 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5.1ubuntu0.1_powerpc.udeb Size/MD5: 67592 c11829d98adc0dd16883d1b00c773691 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5.1ubuntu0.1_powerpc.deb Size/MD5: 112146 e95acde5a5756fe1e8ae3085e160a437 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5.1ubuntu0.1_powerpc.deb Size/MD5: 246662 eea28613a44952b49f1ebd1c9365c31e sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5.1ubuntu0.1_sparc.udeb Size/MD5: 64644 0a019f09ea70eb9e0734542116919875 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5.1ubuntu0.1_sparc.deb Size/MD5: 109320 c8c61d5fc9db2c8edf9ca933bc0aeea6 http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5.1ubuntu0.1_sparc.deb Size/MD5: 241060 a4d7a38de962236150bbbb84be9c542f ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-383-1 OTHER REFERENCES: SA22900: http://secunia.com/advisories/22900/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------