1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - -------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT 200301-7 |
6 |
- - -------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE : libpng |
9 |
SUMMARY : buffer overflow |
10 |
DATE : 2003-01-08 15:01 UTC |
11 |
EXPLOIT : remote |
12 |
|
13 |
- - -------------------------------------------------------------------- |
14 |
|
15 |
- From Debian Security Advisory DSA 213-1: |
16 |
|
17 |
"Glenn Randers-Pehrson discovered a problem in connection with 16-bit |
18 |
samples from libpng, an interface for reading and writing PNG |
19 |
(Portable Network Graphics) format files. The starting offsets for |
20 |
the loops are calculated incorrectly which causes a buffer overrun |
21 |
beyond the beginning of the row buffer." |
22 |
|
23 |
Read the full advisory at |
24 |
http://www.debian.org/security/2002/dsa-213 |
25 |
|
26 |
SOLUTION |
27 |
|
28 |
It is recommended that all Gentoo Linux users who are running |
29 |
media-libs/libpng-1.2.5-r1 or earlier update their systems as follows: |
30 |
|
31 |
emerge rsync |
32 |
emerge libpng |
33 |
|
34 |
If you also have libpng-1.0.12-r1 or earlier installed update your |
35 |
system as follows: |
36 |
|
37 |
emerge \=media-libs/libpng-1.0.12-r2 |
38 |
|
39 |
Finish with: |
40 |
|
41 |
emerge clean |
42 |
|
43 |
- - -------------------------------------------------------------------- |
44 |
aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz |
45 |
- - -------------------------------------------------------------------- |
46 |
-----BEGIN PGP SIGNATURE----- |
47 |
Version: GnuPG v1.2.1 (GNU/Linux) |
48 |
|
49 |
iD8DBQE+HEShfT7nyhUpoZMRAvoiAKCKhtJz+FVEW84Zr+NDEQ5xYcqf7gCgxLZ8 |
50 |
teSWsNMM8ls6TU7MfX7/lyM= |
51 |
=bhV+ |
52 |
-----END PGP SIGNATURE----- |