Debian Security Advisory DSA 628-1 security@
debian.org
http://www.debian.org/security/ Martin Schulze
January 6th, 2005
http://www.debian.org/security/faq
Package : imlib2
Vulnerability : integer overflows
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-1026
Pavel Kankovsky discovered that several overflows found in the libXpm
library were also present in imlib and imlib2, imaging libraries for
X11. An attacker could create a carefully crafted image file in such
a way that it could cause an application linked with imlib or imlib2
to execute arbitrary code when the file was opened by a victim. The
Common Vulnerabilities and Exposures project identifies the following
problems:
CAN-2004-1025
Multiple heap-based buffer overflows. No such code is present in
imlib2.
CAN-2004-1026
Multiple integer overflows in the imlib library.
For the stable distribution (woody) these problems have been fixed in
version 1.0.5-2woody2.
For the unstable distribution (sid) these problems will be fixed soon.
We recommend that you upgrade your imlib2 packages.
Debian Security Advisory DSA 627-1 security@
debian.org
http://www.debian.org/security/ Martin Schulze
January 6th, 2005
http://www.debian.org/security/faq
Package : namazu2
Vulnerability : unsanitised input
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-1318
A cross-site scripting
vulnerability has been discovered in namazu2, a
full text search engine. An attacker could prepare specially crafted
input that would not be sanitised by namazu2 and hence displayed
verbatim for the victim.
For the stable distribution (woody) this problem has been fixed in
version 2.0.10-1woody3.
For the unstable distribution (sid) this problem has been fixed in
version 2.0.14-1.
We recommend that you upgrade your namazu2 package.
Debian Security Advisory DSA 626-1 security@
debian.org
http://www.debian.org/security/ Martin Schulze
January 6th, 2005
http://www.debian.org/security/faq
Package :
tiff
Vulnerability : unsanitised input
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-1183
Dmitry V. Levin discovered a buffer overflow in libtiff, the Tag Image
File Format library for processing
TIFF graphics files. Upon reading
a
TIFF file it is possible to crash the application, and maybe also to
execute arbitrary code.
For the stable distribution (woody) this problem has been fixed in
version 3.5.5-6.woody5.
For the unstable distribution (sid) this problem has been fixed in
version 3.6.1-5.
We recommend that you upgrade your libtiff package.