Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 195261 - media-libs/libpng < 1.2.22 Multiple Denial of Service Vulnerabilities (CVE-2007-{5266,5268,5269})
Summary: media-libs/libpng < 1.2.22 Multiple Denial of Service Vulnerabilities (CVE-20...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal
Assignee: Gentoo Security
URL: http://secunia.com/advisories/27093/
Whiteboard: A3 [glsa]
Keywords:
: 195387 (view as bug list)
Depends on: 194864
Blocks:
  Show dependency tree
 
Reported: 2007-10-09 14:51 UTC by Tobias Heinlein (RETIRED)
Modified: 2020-04-03 07:00 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tobias Heinlein (RETIRED) gentoo-dev 2007-10-09 14:51:10 UTC
Some vulnerabilities have been reported in libpng, which can be exploited by malicious people to cause a DoS (Denial of Service).

1) Certain errors within libpng, including a logical NOT instead of a bitwise NOT in pngtrtran.c, an error in the 16bit cheap transparency extension, and an incorrect use of sizeof() may be exploited to crash an application using the library.

2) Various out-of-bounds read errors exist within the functions "png_handle_pCAL()", "png_handle_sCAL()", "png_push_read_tEXt()", "png_handle_iTXt()", and "png_handle_ztXt()", which may be exploited by exploited to crash an application using the library.

The vulnerabilities are reported in versions prior to 1.2.21.

Solution:
Update to version 1.2.21.
Comment 1 Tobias Heinlein (RETIRED) gentoo-dev 2007-10-09 14:53:47 UTC
Base-system, please advise.
Comment 2 Tobias Heinlein (RETIRED) gentoo-dev 2007-10-09 14:58:32 UTC
I asked on #-dev whether I should file this bug, Cardoe told me I should. A few minutes later he noticed that the bugs have been introcued in 1.2.19, so our latest stable version should be invulnerable. Closing, sorry for the noise (for the second time even).
Comment 3 Doug Goldstein (RETIRED) gentoo-dev 2007-10-09 16:52:03 UTC
http://sourceforge.net/mailarchive/forum.php?thread_name=3.0.6.32.20071004082318.012a7628%40mail.comcast.net&forum_name=png-mng-implement

Appears to be the discussion on the issue. 

They introduced at least one new issue into 1.2.21 via bug #194864. Right now
we have 1.2.21-r2 in the tree which patches the issue discussed at
http://sourceforge.net/mailarchive/forum.php?thread_name=47067C84.7010205%40playstation.sony.com&forum_name=png-mng-implement

However, the patch doesn't look right to me and a user is still having issues.
Comment 4 Doug Goldstein (RETIRED) gentoo-dev 2007-10-09 16:53:06 UTC
I believe only one of the security issues was introduced in 1.2.19, the other existed before hand as well.
Comment 5 SpanKY gentoo-dev 2007-10-14 21:26:36 UTC
*** Bug 195387 has been marked as a duplicate of this bug. ***
Comment 6 SpanKY gentoo-dev 2007-10-14 21:29:10 UTC
latest version in the tree is stable for everyone now
Comment 7 Robert Buchholz (RETIRED) gentoo-dev 2007-10-14 21:43:02 UTC
(In reply to comment #4)
> I believe only one of the security issues was introduced in 1.2.19, the other
> existed before hand as well.

cardoe, which of them?
Comment 8 Doug Goldstein (RETIRED) gentoo-dev 2007-10-14 22:22:41 UTC
I don't know exactly right now. I looked at the code on Tuesday and found one of the CVE's only really applied to .19 and higher. However there's still 2 other security issues which affect all releases of 1.2.x so it doesn't matter much. libpng's official site just says versions before 1.2.22 are vulnerable. Just looking at some of the patches Mike and I had to apply to 1.2.21 and looking at the diff between 1.2.21, they fixed a lot of code that someone should be ashamed of writing. I'd feel better if we stabilized 1.2.22 and just went with that as our security release rather then backport stuff to 1.2.21.
Comment 9 Robert Buchholz (RETIRED) gentoo-dev 2007-10-15 22:39:11 UTC
(In reply to comment #8)
> I'd feel better if we stabilized 1.2.22 and just
> went with that as our security release rather then backport stuff to 1.2.21.

If you feel that stabilization of .21 introduced or might introduce regressions or .22 is more suited for current stable, we can do this here.
Comment 10 Robert Buchholz (RETIRED) gentoo-dev 2007-10-15 22:41:50 UTC
To sum up the issues fixed here:

CVE-2007-5269:
         Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21
         allow remote attackers to cause a denial of service (crash) via
         crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3)
         tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT
         (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds
         read operations.
CVE-2007-5268:
         pngrtran.c in libpng before 1.0.29 and 1.2.x before 1.2.21 use (1)
         logical instead of bitwise operations and (2) incorrect comparisons,
         which might allow remote attackers to cause a denial of service
         (crash) via a crafted PNG image.
CVE-2007-5266:
         Off-by-one error in ICC profile chunk handling in the png_set_iCCP
         function in pngset.c in libpng before 1.0.29 beta1 and 1.2.x before
         1.2.21 beta1 allows remote attackers to cause a denial of service
         (crash) via a crafted PNG image that prevents a name field from being
         NULL terminated.

Plus:
"another crash bug (related to the ICC-profile chunk) remains to be fixed in version 1.2.22."
Comment 11 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-10-17 19:19:48 UTC
I vote NO.
Comment 12 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-10-20 09:47:20 UTC
that's A3 so no need to vote here...
GLSA request filed.
Comment 13 Robert Buchholz (RETIRED) gentoo-dev 2007-10-26 00:08:03 UTC
(In reply to comment #9)
> (In reply to comment #8)
> > I'd feel better if we stabilized 1.2.22 and just
> > went with that as our security release rather then backport stuff to 1.2.21.
> 
> If you feel that stabilization of .21 introduced or might introduce regressions
> or .22 is more suited for current stable, we can do this here.

Cardoe?
Comment 14 Doug Goldstein (RETIRED) gentoo-dev 2007-10-29 14:48:58 UTC
I was on vacation so that's why the non-response. But yes, I think 1.2.22 should be stabled instead of 1.2.21 since there technically are vulnerabilities still in 1.2.21.
Comment 15 Tobias Heinlein (RETIRED) gentoo-dev 2007-10-29 19:01:15 UTC
Okay. Arch teams, please stabilise media-libs/libpng-1.2.22, targets are: "alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc ~sparc-fbsd x86 ~x86-fbsd".
Comment 16 Robert Buchholz (RETIRED) gentoo-dev 2007-10-29 22:26:12 UTC
Adding arches
Comment 17 Ferris McCormick (RETIRED) gentoo-dev 2007-10-29 22:36:56 UTC
Sparc stays ahead of the curve and is stable.
Comment 18 Mike Doty (RETIRED) gentoo-dev 2007-10-29 22:39:51 UTC
removing solar at his request
Comment 19 Dawid Węgliński (RETIRED) gentoo-dev 2007-10-29 23:07:20 UTC
Stable on x86
Comment 20 Jeroen Roovers (RETIRED) gentoo-dev 2007-10-30 03:17:09 UTC
Stable for HPPA.
Comment 21 Raúl Porcel (RETIRED) gentoo-dev 2007-10-30 18:18:37 UTC
alpha/ia64 stable
Comment 22 Markus Rothe (RETIRED) gentoo-dev 2007-10-30 18:59:17 UTC
ppc64 stable
Comment 23 Daniel Gryniewicz (RETIRED) gentoo-dev 2007-10-30 19:24:26 UTC
amd64 done.
Comment 24 Tobias Scherbaum (RETIRED) gentoo-dev 2007-10-30 19:35:10 UTC
ppc stable
Comment 25 Robert Buchholz (RETIRED) gentoo-dev 2007-10-30 23:55:21 UTC
GLSA was already filed.
Comment 26 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-11-07 20:34:54 UTC
GLSA 200711-08