Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2004-0597

Publication date 23 November 2004

Last updated 24 July 2024


Ubuntu priority

Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.

Status

Package Ubuntu Release Status
libpng 7.04 feisty
Fixed 1.2.15~beta5-1ubuntu1
6.10 edgy
Fixed 1.2.8rel-5.1ubuntu0.2
6.06 LTS dapper
Fixed 1.2.8rel-5ubuntu0.2
libpng3 7.04 feisty Not in release
6.10 edgy
Fixed 1.2.8rel-1ubuntu3
6.06 LTS dapper
Fixed 1.2.8rel-1ubuntu3