Search for in Google by Dino

Google Custom Search

sábado, 17 de febrero de 2007

Gentoo Security Advisory GLSA 200607-06 (libpng)

The remote host is missing updates announced in
advisory GLSA 200607-06.

A buffer overflow has been found in the libpng library that could lead to
the execution of arbitrary code.

Solution:
All libpng users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=media-libs/libpng-1.2.12'

All AMD64 emul-linux-x86-baselibs users should also upgrade to the latest
version:

# emerge --sync
# emerge --ask --oneshot --verbose
'>=app-emulation/emul-linux-x86-baselibs-2.5.1'

http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200607-06
http://bugs.gentoo.org/show_bug.cgi?id=138433
http://bugs.gentoo.org/show_bug.cgi?id=138672
http://heanet.dl.sourceforge.net/sourceforge/libpng/libpng-1.2.12-README.txt

Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-3334
http://security.gentoo.org/glsa/glsa-200607-06.xml
SuSE Security Announcement: SUSE-SR:2006:016 (Google Search)
http://www.novell.com/linux/security/advisories/2006_16_sr.html
BugTraq ID: 18698
http://www.securityfocus.com/bid/18698
http://www.frsirt.com/english/advisories/2006/2585
XForce ISS Database: libpng-pngdecompresschunk-bo(27468)
http://xforce.iss.net/xforce/xfdb/27468

Fuente: www.securityspace.com

No hay comentarios.: