Debian Security Advisory

                                                                                                                                                    • -
Debian Security Advisory DSA 628-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 6th, 2005 http://www.debian.org/security/faq
                                                                                                                                                    • -
Package : imlib2 Vulnerability : integer overflows Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-1026 Pavel Kankovsky discovered that several overflows found in the libXpm library were also present in imlib and imlib2, imaging libraries for X11. An attacker could create a carefully crafted image file in such a way that it could cause an application linked with imlib or imlib2 to execute arbitrary code when the file was opened by a victim. The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2004-1025 Multiple heap-based buffer overflows. No such code is present in imlib2. CAN-2004-1026 Multiple integer overflows in the imlib library. For the stable distribution (woody) these problems have been fixed in version 1.0.5-2woody2. For the unstable distribution (sid) these problems will be fixed soon. We recommend that you upgrade your imlib2 packages.
                                                                                                                                                    • -
Debian Security Advisory DSA 627-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 6th, 2005 http://www.debian.org/security/faq
                                                                                                                                                    • -
Package : namazu2 Vulnerability : unsanitised input Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-1318 A cross-site scripting vulnerability has been discovered in namazu2, a full text search engine. An attacker could prepare specially crafted input that would not be sanitised by namazu2 and hence displayed verbatim for the victim. For the stable distribution (woody) this problem has been fixed in version 2.0.10-1woody3. For the unstable distribution (sid) this problem has been fixed in version 2.0.14-1. We recommend that you upgrade your namazu2 package.
                                                                                                                                                    • -
Debian Security Advisory DSA 626-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 6th, 2005 http://www.debian.org/security/faq
                                                                                                                                                    • -
Package : tiff Vulnerability : unsanitised input Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-1183 Dmitry V. Levin discovered a buffer overflow in libtiff, the Tag Image File Format library for processing TIFF graphics files. Upon reading a TIFF file it is possible to crash the application, and maybe also to execute arbitrary code. For the stable distribution (woody) this problem has been fixed in version 3.5.5-6.woody5. For the unstable distribution (sid) this problem has been fixed in version 3.6.1-5. We recommend that you upgrade your libtiff package.