[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080219201857.GA5053@steve.org.uk>
Date: Tue, 19 Feb 2008 20:18:57 +0000
From: Steve Kemp <skx@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 1498-1] New libimager-perl
packages fix arbitrary code execution
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1498-1 security@...ian.org
http://www.debian.org/security/ Steve Kemp
February 19, 2008 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : libimager-perl
Vulnerability : buffer overflow
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2007-2459
Debian Bug : 421582
It was discovered that libimager-perl, a Perl extension for Generating 24
bit images, did not correctly handle 8-bit per-pixel compressed images,
which could allow the execution of arbitrary code.
For the stable distribution, this problem has been fixed in version
0.50-1etch1.
We recommend that you upgrade your libimager-perl package.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Source archives:
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1.diff.gz
Size/MD5 checksum: 3049 e82e882633056ddef2beec5107085163
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1.dsc
Size/MD5 checksum: 702 a2325e2e5fd0522924e1c394260fb902
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50.orig.tar.gz
Size/MD5 checksum: 757843 19cfffe047909599226f76694155f996
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_alpha.deb
Size/MD5 checksum: 648188 54c4d2bfd5fc8db396cf8d9f30ee138e
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_amd64.deb
Size/MD5 checksum: 610124 06b382fe65e0ab39f66436c9a7574c9e
arm architecture (ARM)
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_arm.deb
Size/MD5 checksum: 589256 185b679c399cbafeae33ceefe39e679c
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_hppa.deb
Size/MD5 checksum: 620720 445a0a72c32922d42e7c37afb8c5a361
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_i386.deb
Size/MD5 checksum: 605222 38189ae2167604712b8cb74dbefd5f7a
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_ia64.deb
Size/MD5 checksum: 751930 17f9e9c322ed61445eea4a7c38b2b0fc
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_mips.deb
Size/MD5 checksum: 557940 0e37144272d8f1aed97986e6af175870
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_mipsel.deb
Size/MD5 checksum: 556756 b67b32674f7951f62496cce70e079f00
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_s390.deb
Size/MD5 checksum: 571872 2472728525f114e0faebc7832eeb66c4
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_sparc.deb
Size/MD5 checksum: 607238 eab7744246cea808db37625cc46aac6f
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHuzlawM/Gs81MDZ0RAnmoAJ4uDJZ/IVXuS3B3+KIo+h22JfA6UwCaA2Nf
zc9AiJJUB/Y2QRhRrGyLzwQ=
=CIt+
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists