CentOS Errata and Security Advisory CESA-2012:0317
The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files.
A heap-based buffer overflow flaw was found in libpng. An attacker could create a specially-crafted PNG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026)
Users of libpng and libpng10 should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libpng or libpng10 must be restarted for the update to take effect.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2012-February/018445.html http://lists.centos.org/pipermail/centos-announce/2012-February/018446.html http://lists.centos.org/pipermail/centos-announce/2012-February/018447.html http://lists.centos.org/pipermail/centos-announce/2012-February/018449.html
Affected packages: libpng libpng-devel libpng-static libpng10 libpng10-devel
Upstream details at: https://rhn.redhat.com/errata/RHSA-2012-0317.html