aru Posted July 6, 2004 Report Share Posted July 6, 2004 Mandrakesoft Security Advisories MDKSA-2004:063 : libpng Updated libpng packages fix potential remote compromise June 29th, 2004 A buffer overflow vulnerability was discovered in libpng due to a wrong calculation of some loop offset values. This buffer overflow can lead to Denial of Service or even remote compromise. This vulnerability was initially patched in January of 2003, but it has since been noted that fixes were required in two additional places that had not been corrected with the earlier patch.This update uses an updated patch to fix all known issues. After the upgrade, all applications that use libpng should be restarted.Many applications are linked to libpng, so if you are unsure of what applications to restart, you may wish to reboot the system. Mandrakesoft encourages all users to upgrade immediately. The released versions of Mandrake GNU/Linux affected are: 9.1 9.2 10.0 MNF8.2 CS2.1 Full information about this advisory, including the updated packages, is available at: www.mandrakesoft.com/security/advisories?name=MDKSA-2004:063 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363 http://www.mandrakesoft.com/security/advis...=MDKSA-2003:008 Posted automatically by aru (mdksec2mub v0.0.9) Link to comment Share on other sites More sharing options...
Recommended Posts