Jump to content

Security Advisories (MDKSA-2004:063): libpng


 Share

Recommended Posts

Mandrakesoft Security Advisories MDKSA-2004:063 : libpng

 

Updated libpng packages fix potential remote compromise

June 29th, 2004

 

A buffer overflow vulnerability was discovered in libpng due to a wrong calculation of some loop offset values. This buffer overflow can lead to Denial of Service or even remote compromise.

 

This vulnerability was initially patched in January of 2003, but it has since been noted that fixes were required in two additional places that had not been corrected with the earlier patch.This update uses an updated patch to fix all known issues.

 

After the upgrade, all applications that use libpng should be restarted.Many applications are linked to libpng, so if you are unsure of what applications to restart, you may wish to reboot the system. Mandrakesoft encourages all users to upgrade immediately.

 

 

The released versions of Mandrake GNU/Linux affected are:

  • 9.1
  • 9.2
  • 10.0
  • MNF8.2
  • CS2.1

Full information about this advisory, including the updated packages, is available at:

www.mandrakesoft.com/security/advisories?name=MDKSA-2004:063

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363

http://www.mandrakesoft.com/security/advis...=MDKSA-2003:008

 

Posted automatically by aru (mdksec2mub v0.0.9)

Link to comment
Share on other sites

 Share

×
×
  • Create New...