- --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200301-7
- --------------------------------------------------------------------

PACKAGE : libpng
SUMMARY : buffer overflow
DATE    : 2003-01-08 15:01 UTC
EXPLOIT : remote

- --------------------------------------------------------------------

From Debian Security Advisory DSA 213-1:

"Glenn Randers-Pehrson discovered a problem in connection with 16-bit
samples from libpng, an interface for reading and writing PNG
(Portable Network Graphics) format files.  The starting offsets for
the loops are calculated incorrectly which causes a buffer overrun
beyond the beginning of the row buffer."

Read the full advisory at 
http://www.debian.org/security/2002/dsa-213

SOLUTION

It is recommended that all Gentoo Linux users who are running
media-libs/libpng-1.2.5-r1 or earlier update their systems as follows:

emerge rsync
emerge libpng

If you also have libpng-1.0.12-r1 or earlier installed update your
system as follows:

emerge \=media-libs/libpng-1.0.12-r2

Finish with:

emerge clean

- --------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at - --------------------------------------------------------------------


Gentoo: libpng buffer overflow vulnerability

There is a problem in connection with 16-bit samples from libpng.

Summary


- --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200301-7
- --------------------------------------------------------------------
DATE    : 2003-01-08 15:01 UTC

- --------------------------------------------------------------------
From Debian Security Advisory DSA 213-1:
"Glenn Randers-Pehrson discovered a problem in connection with 16-bit samples from libpng, an interface for reading and writing PNG (Portable Network Graphics) format files. The starting offsets for the loops are calculated incorrectly which causes a buffer overrun beyond the beginning of the row buffer."
Read the full advisory at http://www.debian.org/security/2002/dsa-213
SOLUTION
It is recommended that all Gentoo Linux users who are running media-libs/libpng-1.2.5-r1 or earlier update their systems as follows:
emerge rsync emerge libpng
If you also have libpng-1.0.12-r1 or earlier installed update your system as follows:
emerge \=media-libs/libpng-1.0.12-r2
Finish with:
emerge clean
- -------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - --------------------------------------------------------------------

Resolution

References

Availability

Concerns

Severity
PACKAGE : libpng
SUMMARY : buffer overflow
EXPLOIT : remote

Synopsis

Background

Affected Packages

Impact

Workaround

Related News