Lucene search

K
centosCentOS ProjectCESA-2012:0317
HistoryFeb 20, 2012 - 9:59 p.m.

libpng, libpng10 security update

2012-02-2021:59:45
CentOS Project
lists.centos.org
66

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.832 High

EPSS

Percentile

98.4%

CentOS Errata and Security Advisory CESA-2012:0317

The libpng packages contain a library of functions for creating and
manipulating PNG (Portable Network Graphics) image format files.

A heap-based buffer overflow flaw was found in libpng. An attacker could
create a specially-crafted PNG image that, when opened, could cause an
application using libpng to crash or, possibly, execute arbitrary code with
the privileges of the user running the application. (CVE-2011-3026)

Users of libpng and libpng10 should upgrade to these updated packages,
which contain a backported patch to correct this issue. All running
applications using libpng or libpng10 must be restarted for the update to
take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-February/080607.html
https://lists.centos.org/pipermail/centos-announce/2012-February/080608.html
https://lists.centos.org/pipermail/centos-announce/2012-February/080609.html
https://lists.centos.org/pipermail/centos-announce/2012-February/080611.html

Affected packages:
libpng
libpng-devel
libpng-static
libpng10
libpng10-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0317

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.832 High

EPSS

Percentile

98.4%