First published: Thu Jul 28 2011(Updated: )
The libpng packages contain a library of functions for creating and<br>manipulating PNG (Portable Network Graphics) image format files.<br>A buffer overflow flaw was found in the way libpng processed certain PNG<br>image files. An attacker could create a specially-crafted PNG image that,<br>when opened, could cause an application using libpng to crash or,<br>potentially, execute arbitrary code with the privileges of the user running<br>the application. (CVE-2011-2690)<br>Note: The application behavior required to exploit CVE-2011-2690 is rarely<br>used. No application shipped with Red Hat Enterprise Linux behaves this<br>way, for example.<br>An uninitialized memory read issue was found in the way libpng processed<br>certain PNG images that use the Physical Scale (sCAL) extension. An<br>attacker could create a specially-crafted PNG image that, when opened,<br>could cause an application using libpng to crash. (CVE-2011-2692)<br>Users of libpng should upgrade to these updated packages, which contain<br>backported patches to correct these issues. All running applications using<br>libpng must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libpng | <1.2.10-7.1.el5_7.5 | 1.2.10-7.1.el5_7.5 |
redhat/libpng | <1.2.10-7.1.el5_7.5 | 1.2.10-7.1.el5_7.5 |
redhat/libpng-devel | <1.2.10-7.1.el5_7.5 | 1.2.10-7.1.el5_7.5 |
redhat/libpng-devel | <1.2.10-7.1.el5_7.5 | 1.2.10-7.1.el5_7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.