CVE-2011-0408

Publication date 18 January 2011

Last updated 24 July 2024


Ubuntu priority

pngrtran.c in libpng 1.5.x before 1.5.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted palette-based PNG image that triggers a buffer overflow, related to the png_do_expand_palette function, the png_do_rgb_to_gray function, and an integer underflow. NOTE: some of these details are obtained from third party information.

Read the notes from the security team

Status

Package Ubuntu Release Status
chromium-browser 10.10 maverick
Not affected
10.04 LTS lucid
Not affected
9.10 karmic Not in release
8.04 LTS hardy Not in release
6.06 LTS dapper Not in release
firefox 10.10 maverick
Not affected
10.04 LTS lucid
Not affected
9.10 karmic Not in release
8.04 LTS hardy
Not affected
6.06 LTS dapper Ignored end of life
libpng 10.10 maverick
Not affected
10.04 LTS lucid
Not affected
9.10 karmic
Not affected
8.04 LTS hardy
Not affected
6.06 LTS dapper
Not affected

Notes


mdeslaur

libpng 1.5.x only, so not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libpng