CWE
119
Advisory Published

RHSA-2011:1105: Moderate: libpng security update

First published: Thu Jul 28 2011(Updated: )

The libpng packages contain a library of functions for creating and<br>manipulating PNG (Portable Network Graphics) image format files.<br>A buffer overflow flaw was found in the way libpng processed certain PNG<br>image files. An attacker could create a specially-crafted PNG image that,<br>when opened, could cause an application using libpng to crash or,<br>potentially, execute arbitrary code with the privileges of the user running<br>the application. (CVE-2011-2690)<br>Note: The application behavior required to exploit CVE-2011-2690 is rarely<br>used. No application shipped with Red Hat Enterprise Linux behaves this<br>way, for example.<br>An out-of-bounds memory read flaw was found in the way libpng processed<br>certain PNG image files. An attacker could create a specially-crafted PNG<br>image that, when opened, could cause an application using libpng to crash.<br>(CVE-2011-2501)<br>An uninitialized memory read issue was found in the way libpng processed<br>certain PNG images that use the Physical Scale (sCAL) extension. An<br>attacker could create a specially-crafted PNG image that, when opened,<br>could cause an application using libpng to crash. (CVE-2011-2692)<br>Users of libpng should upgrade to these updated packages, which upgrade<br>libpng to version 1.2.46 to correct these issues. All running applications<br>using libpng must be restarted for the update to take effect.<br>

Affected SoftwareAffected VersionHow to fix
redhat/libpng<1.2.46-1.el6_1
1.2.46-1.el6_1
redhat/libpng<1.2.46-1.el6_1
1.2.46-1.el6_1
redhat/libpng-debuginfo<1.2.46-1.el6_1
1.2.46-1.el6_1
redhat/libpng-debuginfo<1.2.46-1.el6_1
1.2.46-1.el6_1
redhat/libpng-devel<1.2.46-1.el6_1
1.2.46-1.el6_1
redhat/libpng-devel<1.2.46-1.el6_1
1.2.46-1.el6_1
redhat/libpng-static<1.2.46-1.el6_1
1.2.46-1.el6_1
redhat/libpng-static<1.2.46-1.el6_1
1.2.46-1.el6_1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of RHSA-2011:1105?

    RHSA-2011:1105 is classified as a critical vulnerability due to the potential for remote code execution from specially crafted PNG files.

  • How do I fix RHSA-2011:1105?

    To remediate RHSA-2011:1105, update the libpng packages to version 1.2.46-1.el6_1 or later.

  • Which versions of libpng are affected by RHSA-2011:1105?

    RHSA-2011:1105 affects all versions of libpng prior to 1.2.46-1.el6_1.

  • What type of attack does RHSA-2011:1105 facilitate?

    RHSA-2011:1105 could be exploited to conduct buffer overflow attacks that may allow execution of arbitrary code.

  • Is there a workaround for RHSA-2011:1105?

    There are no known workarounds for RHSA-2011:1105; updating to the fixed version is strongly recommended.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203