Debian: netpbm-free denial of service vulnerability

    Date17 Mar 2003
    Posted ByLinuxSecurity Advisories
    These vulnerabilities may allow remote attackers to cause a denial of service or execute arbitrary code.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 263-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    March 17th, 2003               
    - --------------------------------------------------------------------------
    Package        : netpbm-free
    Vulnerability  : math overflow errors
    Problem-Type   : remote
    Debian-specific: no
    CVE Id         : CAN-2003-0146
    CERT advisory  : VU#378049 VU#630433
    Al Viro and Alan Cox discovered several maths overflow errors in
    NetPBM, a set of graphics conversion tools.  These programs are not
    installed setuid root but are often installed to prepare data for
    processing.  These vulnerabilities may allow remote attackers to cause
    a denial of service or execute arbitrary code.
    For the stable distribution (woody) this problem has been
    fixed in version 9.20-8.2.
    The old stable distribution (potato) does not seem to be affected
    by this problem.
    For the unstable distribution (sid) this problem has been
    fixed in version 9.20-9.
    We recommend that you upgrade your netpbm package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      662 1c8d2ac6308e12bd407551f0a239709e
          Size/MD5 checksum:    48519 15bdcd7cdbbd33e4eafedc4224ec158a
          Size/MD5 checksum:  1882851 0f153116c21bc7d2e167e574a486c22f
      Alpha architecture:
          Size/MD5 checksum:    77636 fbd95c88eec1506033829ef65a56b033
          Size/MD5 checksum:   135348 d6fc73f5432869a4c8c20d6a6d202a3e
          Size/MD5 checksum:  1412714 9c508ca408fbc5f6a03f5a2e320cad60
      ARM architecture:
          Size/MD5 checksum:    64038 5d2ff5816d2bc9f5b9b8f6555c0dc365
          Size/MD5 checksum:   125450 3422bd71d85d14d950f4b490ea7fcb14
          Size/MD5 checksum:  1127198 ff627c8920c5bd9c3420a7182e07a764
      Intel IA-32 architecture:
          Size/MD5 checksum:    62358 89e5f42f2d3a11b4b7c9dc27b996324d
          Size/MD5 checksum:   103340 0f0c7e2bbbeb897bc1993ce2ca2dee06
          Size/MD5 checksum:  1078350 415a6018874f103405739bb92d718100
      Intel IA-64 architecture:
          Size/MD5 checksum:    96448 65abd6e7e2945f52cc31727d5c2d48b1
          Size/MD5 checksum:   170308 05e9e8e8b00f1fcba4511cb55b8be368
          Size/MD5 checksum:  1608002 84bca62575bc798425e65ce0733fde65
      HP Precision architecture:
          Size/MD5 checksum:    83808 6c997768d27d95ff71247ab15a63dad1
          Size/MD5 checksum:   122828 dab9d6a493a3bb46393c7302a44accf7
          Size/MD5 checksum:  1337162 054e5945f8146d45a1b178ca95658b12
      Motorola 680x0 architecture:
          Size/MD5 checksum:    61934 bb0176c0eed79eafa32cbc8f5a99dfdf
          Size/MD5 checksum:   102168 96dbb5b18d035271df0f0869c133bd67
          Size/MD5 checksum:  1015872 2623494e16dd50bd501a3a997728d171
      Big endian MIPS architecture:
          Size/MD5 checksum:    66786 d5c5c8489604d78caaa22848a550c45d
          Size/MD5 checksum:   123388 0857fec48f758c7bc03970c1fe10e380
          Size/MD5 checksum:  1180196 a4d7a426394a49a5bb45016e07968f6f
      Little endian MIPS architecture:
          Size/MD5 checksum:    66634 662ea4730741b05828f05dfddcf3f898
          Size/MD5 checksum:   123470 258d8c25b158c9aed55ca834978ee187
          Size/MD5 checksum:  1179396 9683bc1daf0995513ed0e4da45b9f049
      PowerPC architecture:
          Size/MD5 checksum:    68820 82bca6ab6d5de943fc679720e3f0ab41
          Size/MD5 checksum:   117740 58cf095d8d6f3412f1f77dcbe6937c55
          Size/MD5 checksum:  1153158 b7f77f69d770e60a72f6ac871b6aac5c
      IBM S/390 architecture:
          Size/MD5 checksum:    66578 0e30246acdafd967fe8ec9bc7498471a
          Size/MD5 checksum:   115954 a78fc5ce68c4d4f2048e0a710d549387
          Size/MD5 checksum:  1129792 70e64ceb300ce172d4d0bb70d1882857
      Sun Sparc architecture:
          Size/MD5 checksum:    65178 51ecb73928e1174549858df7bfbab9d0
          Size/MD5 checksum:   118504 a1d655dea3f122cc5306e23e4cfb6d5b
          Size/MD5 checksum:  1435110 6d59d67b733a674d107750e850216f6a
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"90","type":"x","order":"1","pct":78.95,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":15.79,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":5.26,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.