Gentoo: libpng buffer overflow vulnerability
Summary
- -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200301-7 - -------------------------------------------------------------------- DATE : 2003-01-08 15:01 UTC
- --------------------------------------------------------------------
From Debian Security Advisory DSA 213-1:
"Glenn Randers-Pehrson discovered a problem in connection with 16-bit samples from libpng, an interface for reading and writing PNG (Portable Network Graphics) format files. The starting offsets for the loops are calculated incorrectly which causes a buffer overrun beyond the beginning of the row buffer."
Read the full advisory at http://www.debian.org/security/2002/dsa-213
SOLUTION
It is recommended that all Gentoo Linux users who are running media-libs/libpng-1.2.5-r1 or earlier update their systems as follows:
emerge rsync emerge libpng
If you also have libpng-1.0.12-r1 or earlier installed update your system as follows:
emerge \=media-libs/libpng-1.0.12-r2
Finish with:
emerge clean
- -------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - --------------------------------------------------------------------