Package: syslinux Severity: important Tags: security I have been working on a tool called Clonewise to automatically identify embedded code copies in Debian packages and determine if they are out of date and vulnerable. Ideally, embedding code and libraries should be avoided and a system wide library should be used instead.
I recently ran the tool on Debian 6 stable. The results are here at http://www.foocodechu.com/downloads/Clonewise-report.txt* *The syslinux package reported potential issues appended to this message. The analysis tries to justify why it believes a library or code is embedded in the package and if the relationship is not already being tracked by Debian in the embedded-code-copies database it shows the files that are shared between the two pieces of software. Apologies if these are false positives. Your help in advising me on whether these issues are real will help me improve the analysis for the future. -- Silvio Cesare Deakin University ### Summary: ### libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2010-0205 libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2010-1205 libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2010-2249 libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-0408 libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-2501 libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-2691 libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-2692 libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-3328 ### Reports by package: ### # Package syslinux may be vulnerable to the following issues: # CVE-2010-0205 CVE-2010-1205 CVE-2010-2249 CVE-2011-0408 CVE-2011-2501 CVE-2011-2691 CVE-2011-2692 CVE-2011-3328 # SUMMARY: The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack. # # CVE-2010-0205 relates to a vulnerability in package libpng. # The following source filenames are likely responsible: # pngrutil.c # # The following package clones are NOT tracked in the embedded-code-copies # database. # libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2010-0205 MATCH example.c/example.c (4.547585) MATCH png.c/png.c (5.367624) MATCH pngerror.c/pngerror.c (6.409078) MATCH pnggccrd.c/pnggccrd.c (6.814543) MATCH pngget.c/pngget.c (6.442979) MATCH pngmem.c/pngmem.c (6.409078) MATCH pngpread.c/pngpread.c (6.478071) MATCH pngrio.c/pngrio.c (6.442979) MATCH pngrtran.c/pngrtran.c (6.442979) MATCH pngrutil.c/pngrutil.c (6.442979) MATCH pngtest.c/pngtest.c (6.977062) MATCH pngtrans.c/pngtrans.c (6.376288) MATCH pngvcrd.c/pngvcrd.c (6.814543) MATCH pngwrite.c/pngwrite.c (6.283915) # SUMMARY: Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row. # # CVE-2010-1205 relates to a vulnerability in package libpng. # The following source filenames are likely responsible: # pngpread.c # # The following package clones are NOT tracked in the embedded-code-copies # database. # libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2010-1205 MATCH example.c/example.c (4.547585) MATCH png.c/png.c (5.367624) MATCH pngerror.c/pngerror.c (6.409078) MATCH pnggccrd.c/pnggccrd.c (6.814543) MATCH pngget.c/pngget.c (6.442979) MATCH pngmem.c/pngmem.c (6.409078) MATCH pngpread.c/pngpread.c (6.478071) MATCH pngrio.c/pngrio.c (6.442979) MATCH pngrtran.c/pngrtran.c (6.442979) MATCH pngrutil.c/pngrutil.c (6.442979) MATCH pngtest.c/pngtest.c (6.977062) MATCH pngtrans.c/pngtrans.c (6.376288) MATCH pngvcrd.c/pngvcrd.c (6.814543) MATCH pngwrite.c/pngwrite.c (6.283915) # SUMMARY: Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks. # # CVE-2010-2249 relates to a vulnerability in package libpng. # The following source filenames are likely responsible: # pngrutil.c # # The following package clones are NOT tracked in the embedded-code-copies # database. # libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2010-2249 MATCH example.c/example.c (4.547585) MATCH png.c/png.c (5.367624) MATCH pngerror.c/pngerror.c (6.409078) MATCH pnggccrd.c/pnggccrd.c (6.814543) MATCH pngget.c/pngget.c (6.442979) MATCH pngmem.c/pngmem.c (6.409078) MATCH pngpread.c/pngpread.c (6.478071) MATCH pngrio.c/pngrio.c (6.442979) MATCH pngrtran.c/pngrtran.c (6.442979) MATCH pngrutil.c/pngrutil.c (6.442979) MATCH pngtest.c/pngtest.c (6.977062) MATCH pngtrans.c/pngtrans.c (6.376288) MATCH pngvcrd.c/pngvcrd.c (6.814543) MATCH pngwrite.c/pngwrite.c (6.283915) # SUMMARY: pngrtran.c in libpng 1.5.x before 1.5.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted palette-based PNG image that triggers a buffer overflow, related to the png_do_expand_palette function, the png_do_rgb_to_gray function, and an integer underflow. NOTE: some of these details are obtained from third party information. # # CVE-2011-0408 relates to a vulnerability in package libpng. # The following source filenames are likely responsible: # pngrtran.c # # The following package clones are NOT tracked in the embedded-code-copies # database. # libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-0408 MATCH example.c/example.c (4.547585) MATCH png.c/png.c (5.367624) MATCH pngerror.c/pngerror.c (6.409078) MATCH pnggccrd.c/pnggccrd.c (6.814543) MATCH pngget.c/pngget.c (6.442979) MATCH pngmem.c/pngmem.c (6.409078) MATCH pngpread.c/pngpread.c (6.478071) MATCH pngrio.c/pngrio.c (6.442979) MATCH pngrtran.c/pngrtran.c (6.442979) MATCH pngrutil.c/pngrutil.c (6.442979) MATCH pngtest.c/pngtest.c (6.977062) MATCH pngtrans.c/pngtrans.c (6.376288) MATCH pngvcrd.c/pngvcrd.c (6.814543) MATCH pngwrite.c/pngwrite.c (6.283915) # SUMMARY: The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. NOTE: this vulnerability exists because of a CVE-2004-0421 regression. # # CVE-2011-2501 relates to a vulnerability in package libpng. # The following source filenames are likely responsible: # pngerror.c # # The following package clones are NOT tracked in the embedded-code-copies # database. # libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-2501 MATCH example.c/example.c (4.547585) MATCH png.c/png.c (5.367624) MATCH pngerror.c/pngerror.c (6.409078) MATCH pnggccrd.c/pnggccrd.c (6.814543) MATCH pngget.c/pngget.c (6.442979) MATCH pngmem.c/pngmem.c (6.409078) MATCH pngpread.c/pngpread.c (6.478071) MATCH pngrio.c/pngrio.c (6.442979) MATCH pngrtran.c/pngrtran.c (6.442979) MATCH pngrutil.c/pngrutil.c (6.442979) MATCH pngtest.c/pngtest.c (6.977062) MATCH pngtrans.c/pngtrans.c (6.376288) MATCH pngvcrd.c/pngvcrd.c (6.814543) MATCH pngwrite.c/pngwrite.c (6.283915) # SUMMARY: The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image. # # CVE-2011-2691 relates to a vulnerability in package libpng. # The following source filenames are likely responsible: # pngerror.c # # The following package clones are NOT tracked in the embedded-code-copies # database. # libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-2691 MATCH example.c/example.c (4.547585) MATCH png.c/png.c (5.367624) MATCH pngerror.c/pngerror.c (6.409078) MATCH pnggccrd.c/pnggccrd.c (6.814543) MATCH pngget.c/pngget.c (6.442979) MATCH pngmem.c/pngmem.c (6.409078) MATCH pngpread.c/pngpread.c (6.478071) MATCH pngrio.c/pngrio.c (6.442979) MATCH pngrtran.c/pngrtran.c (6.442979) MATCH pngrutil.c/pngrutil.c (6.442979) MATCH pngtest.c/pngtest.c (6.977062) MATCH pngtrans.c/pngtrans.c (6.376288) MATCH pngvcrd.c/pngvcrd.c (6.814543) MATCH pngwrite.c/pngwrite.c (6.283915) # SUMMARY: The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory. # # CVE-2011-2692 relates to a vulnerability in package libpng. # The following source filenames are likely responsible: # pngrutil.c # # The following package clones are NOT tracked in the embedded-code-copies # database. # libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-2692 MATCH example.c/example.c (4.547585) MATCH png.c/png.c (5.367624) MATCH pngerror.c/pngerror.c (6.409078) MATCH pnggccrd.c/pnggccrd.c (6.814543) MATCH pngget.c/pngget.c (6.442979) MATCH pngmem.c/pngmem.c (6.409078) MATCH pngpread.c/pngpread.c (6.478071) MATCH pngrio.c/pngrio.c (6.442979) MATCH pngrtran.c/pngrtran.c (6.442979) MATCH pngrutil.c/pngrutil.c (6.442979) MATCH pngtest.c/pngtest.c (6.977062) MATCH pngtrans.c/pngtrans.c (6.376288) MATCH pngvcrd.c/pngvcrd.c (6.814543) MATCH pngwrite.c/pngwrite.c (6.283915) # SUMMARY: The png_handle_cHRM function in pngrutil.c in libpng 1.5.4, when color-correction support is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a malformed PNG image containing a cHRM chunk associated with a certain zero value. # # CVE-2011-3328 relates to a vulnerability in package libpng. # The following source filenames are likely responsible: # pngrutil.c # # The following package clones are NOT tracked in the embedded-code-copies # database. # libpng CLONED_IN_SOURCE syslinux <unfixed> CVE-2011-3328 MATCH example.c/example.c (4.547585) MATCH png.c/png.c (5.367624) MATCH pngerror.c/pngerror.c (6.409078) MATCH pnggccrd.c/pnggccrd.c (6.814543) MATCH pngget.c/pngget.c (6.442979) MATCH pngmem.c/pngmem.c (6.409078) MATCH pngpread.c/pngpread.c (6.478071) MATCH pngrio.c/pngrio.c (6.442979) MATCH pngrtran.c/pngrtran.c (6.442979) MATCH pngrutil.c/pngrutil.c (6.442979) MATCH pngtest.c/pngtest.c (6.977062) MATCH pngtrans.c/pngtrans.c (6.376288) MATCH pngvcrd.c/pngvcrd.c (6.814543) MATCH pngwrite.c/pngwrite.c (6.283915)