Security Advisory libpng security update

Advisory: RHSA-2002:152-11
Type: Security Advisory
Severity: Important
Issued on: 2002-07-23
Last updated on: 2002-08-01
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
CVEs ( CVE-2002-0660


Updated libpng packages are available that fix a buffer overflow vulnerability.

The libpng package contains a library of functions for creating and
manipulating PNG (Portable Network Graphics) image format files. PNG
is a bit-mapped graphics format similar to the GIF format.

Versions of libpng prior to 1.0.14 contain a buffer overflow in the
progressive reader when the PNG datastream contains more IDAT data than
indicated by the IHDR chunk. Such deliberately malformed datastreams would
crash applications linked to libpng such as Mozilla that use the
progressive reading feature.

Packages within Red Hat Linux Advanced Server , such as Mozilla, make use
of the shared libpng library, therefore all users are advised to upgrade to
the errata packages which contain libpng 1.0.14. Libpng 1.0.14 is not
vulnerable to this issue and contains fixes for other bugs including a
number of memory leaks.


Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network. To use Red
Hat Network, launch the Red Hat Update Agent with the following command:


This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

File outdated by:  RHSA-2009:0333
    MD5: 9d889338062ed3f54c274f8d287f8478
File outdated by:  RHSA-2009:0333
    MD5: 738be191bbe6ae286185cc7e03686c2b
File outdated by:  RHSA-2009:0333
    MD5: e1b6c601e3469125617278a948eeea4f
(The unlinked packages above are only available from the Red Hat Network)



buffer, IDAT, IHDR, libpng, overflow

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at