- Issued:
- 2003-02-06
- Updated:
- 2003-02-05
RHSA-2003:007 - Security Advisory
Synopsis
libpng security update
Type/Severity
Security Advisory: Important
Topic
Updated libpng packages are available which fix a buffer overflow
vulnerability.
[Updated 06 Feb 2003]
Added fixed packages for Advanced Workstation 2.1
Description
The libpng package contains a library of functions for creating and
manipulating PNG (Portable Network Graphics) image format files. PNG
is a bit-mapped graphics format similar to the GIF format.
Unpatched versions of libpng 1.2.1 and earlier do not correctly calculate
offsets, which leads to a buffer overflow and the possibility of arbitrary
code execution. This could be exploited by an attacker creating a
carefully crafted PNG file which could execute arbitrary code when the
victim views it.
Packages within Red Hat Linux Advanced Server, such as Mozilla, make use of
the shared libpng library. All users are advised to upgrade to the errata
packages, which contain libpng 1.0.14 with a backported patch that corrects
this issue.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 2 ia64
- Red Hat Enterprise Linux Workstation 2 ia64
Fixes
- BZ - 81157 - Buffer overflow issue in libpng
CVEs
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.