Skip to navigation

Security Advisory libpng security update

Advisory: RHSA-2002:152-11
Type: Security Advisory
Severity: Important
Issued on: 2002-07-23
Last updated on: 2002-08-01
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
CVEs (cve.mitre.org): CVE-2002-0660
CVE-2002-0728

Details

Updated libpng packages are available that fix a buffer overflow vulnerability.

The libpng package contains a library of functions for creating and
manipulating PNG (Portable Network Graphics) image format files. PNG
is a bit-mapped graphics format similar to the GIF format.

Versions of libpng prior to 1.0.14 contain a buffer overflow in the
progressive reader when the PNG datastream contains more IDAT data than
indicated by the IHDR chunk. Such deliberately malformed datastreams would
crash applications linked to libpng such as Mozilla that use the
progressive reading feature.

Packages within Red Hat Linux Advanced Server , such as Mozilla, make use
of the shared libpng library, therefore all users are advised to upgrade to
the errata packages which contain libpng 1.0.14. Libpng 1.0.14 is not
vulnerable to this issue and contains fixes for other bugs including a
number of memory leaks.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network. To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
libpng-1.0.14-0.7x.3.src.rpm
File outdated by:  RHSA-2009:0333
    MD5: 9d889338062ed3f54c274f8d287f8478
 
IA-32:
libpng-1.0.14-0.7x.3.i386.rpm
File outdated by:  RHSA-2009:0333
    MD5: 738be191bbe6ae286185cc7e03686c2b
libpng-devel-1.0.14-0.7x.3.i386.rpm
File outdated by:  RHSA-2009:0333
    MD5: e1b6c601e3469125617278a948eeea4f
 

References


Keywords

buffer, IDAT, IHDR, libpng, overflow


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/