Conectiva Linux Advisory: libpng

20
Conectiva: “The 1.2.4* and 1.0.14 releases of libpng solve a potential buffer
overflow vulnerability[1] in some functions related to progressive
image loading. Programs such as mozilla and various others use these
functions. An attacker could exploit this to remotely run arbitrary
code or crash an application by using a specially crafted png image.”

- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --------------------------------------------------------------------------

PACKAGE   : libpng
SUMMARY   : Buffer overflow vulnerability
DATE      : 2002-07-17 14:50:00
ID        : CLA-2002:512
RELEVANT
RELEASES  : 6.0, 7.0, 8

- -------------------------------------------------------------------------

DESCRIPTION
 libpng is a library used to create and manipulate PNG (Portable
 Network Graphics) image files.
 
 The 1.2.4* and 1.0.14 releases of libpng solve a potential buffer
 overflow vulnerability[1] in some functions related to progressive
 image loading. Programs such as mozilla and various others use these
 functions. An attacker could exploit this to remotely run arbitrary
 code or crash an application by using a specially crafted png image.
 
 These new releases also solve other minor bugs such as some memory
 leaks in reading image functions.
 
 * libpng 1.2.4 is available only in Conectiva Linux 8, where its
 package is called libpng3.


SOLUTION
 All users should upgrade.
 
 Please notice that in order to complete the upgrade process, you must
 restart all running aplications that are linked to libpng after the
 new packages installation. You can see a list of such applications
 using the lsof utility, as seen below:
 
 # lsof | grep libpng
 
 
 REFERENCES:
 1.ftp://swrinde.nde.swri.edu/pub/png-group/archives/png-list.200207


DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/libpng-1.0.14-1U60_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/6.0/RPMS/libpng-devel-1.0.14-1U60_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/6.0/SRPMS/libpng-1.0.14-1U60_1cl.src.rpmftp://atualizacoes.conectiva.com.br/7.0/RPMS/libpng-1.0.14-1U70_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/7.0/RPMS/libpng-devel-1.0.14-1U70_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/7.0/RPMS/libpng-devel-static-1.0.14-1U70_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/7.0/RPMS/libpng-doc-1.0.14-1U70_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/7.0/SRPMS/libpng-1.0.14-1U70_1cl.src.rpmftp://atualizacoes.conectiva.com.br/8/RPMS/libpng-1.0.14-1U8_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/8/RPMS/libpng3-1.2.4-1U8_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/8/RPMS/libpng-devel-1.2.4-1U8_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/8/RPMS/libpng-devel-static-1.2.4-1U8_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/8/RPMS/libpng-doc-1.2.4-1U8_1cl.i386.rpmftp://atualizacoes.conectiva.com.br/8/SRPMS/libpng-1.0.14-1U8_1cl.src.rpmftp://atualizacoes.conectiva.com.br/8/SRPMS/libpng3-1.2.4-1U8_1cl.src.rpm


ADDITIONAL INSTRUCTIONS
 Users of Conectiva Linux version 6.0 or higher may use apt to perform 
 upgrades of RPM packages:
 - add the following line to /etc/apt/sources.list if it is not there yet
   (you may also use linuxconf to do this):

 rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

(replace 6.0 with the correct version number if you are not running CL6.0)

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en

- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br

Category:

  • Security