Linux Security
Linux Security
Linux Security

Debian: New netpbm-free packages fix arbitrary code execution

Date 28 Oct 2005
Posted By Joe Shakespeare
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 878-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
October 28th, 2005            
- --------------------------------------------------------------------------

Package        : netpbm-free
Vulnerability  : buffer overflow
Problem type   : local (remote)
Debian-specific: no
CVE ID         : CVE-2005-2978

A buffer overflow has been identified in the pnmtopng component of the
netpbm package, a set of graphics conversion tools.  This
vulnerability could allow an attacker to execute arbitrary code as a
local user by providing a specially crafted PNM file.

The old stable distribution (woody) it not vulnerable to this problem.

For the stable distribution (sarge) this problem has been fixed in
version 10.0-8sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 10.0-10.

We recommend that you upgrade your netpbm-free packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      749 826066a252124fc16f23cd484665a46f
      Size/MD5 checksum:    44864 f797c3b500fc5255c3624973bce9b1c1
      Size/MD5 checksum:  1926538 985e9f6d531ac0b2004f5cbebdeea87d

  Alpha architecture:
      Size/MD5 checksum:    82612 e3808e3b400840d9a9cb6397f85bfe8e
      Size/MD5 checksum:   145896 57d3e7b0d77e72c94812affa8f55d5fe
      Size/MD5 checksum:    91526 a14de5dcfb2aa0698b25be38a656f036
      Size/MD5 checksum:   146312 cd518afd280793edf6de1642fe0bf131
      Size/MD5 checksum:  1594754 8358e104e61d84614726d16db7d7dd44

  AMD64 architecture:
      Size/MD5 checksum:    68698 3f7cea0750ef84bc28b71e549d2a236b
      Size/MD5 checksum:   117940 e555e5219445a1513e08b9dd74f33be8
      Size/MD5 checksum:    77070 4072597c94858e3dc55d402a6a892e2b
      Size/MD5 checksum:   118338 c9ed97f95be1f82f15ab7ea55f660c7d
      Size/MD5 checksum:  1277348 76f9a183926dc8147c8a3e534b13cff5

  ARM architecture:
      Size/MD5 checksum:    61762 f09e9f6e310df8460df5c24956410557
      Size/MD5 checksum:   114576 988371fd7acc8124d58220c0e41f715c
      Size/MD5 checksum:    68828 f0ccd0d9dbc5167ca98bafdae9d0e281
      Size/MD5 checksum:   115000 9afda9b7e72927c8777b12d89e9cd5e2
      Size/MD5 checksum:  1226590 6deb64cdaf7dca0b6806051cc2413d85

  Intel IA-32 architecture:
      Size/MD5 checksum:    64900 e67ed2af944bf6bf1f47c6273882e1e4
      Size/MD5 checksum:   110486 3e8778e39067e37f596aff3825ce4f20
      Size/MD5 checksum:    71980 e4317b8c78c8ecf616aa4a88663efff7
      Size/MD5 checksum:   110670 7554a1753416b9f8181bf1e901db1d37
      Size/MD5 checksum:  1199370 89b92c6db1e1c83ba67b0526af83202c

  Intel IA-64 architecture:
      Size/MD5 checksum:    96404 0dd071bd6d8e23fd0410bc019e4af21c
      Size/MD5 checksum:   154604 139421c3ff9e1d0452acd95527881c80
      Size/MD5 checksum:   107152 e6c29a86515968c3e25dd5dac02cdcbe
      Size/MD5 checksum:   154944 d86ac4d3a299478611987df9b3f5c3f5
      Size/MD5 checksum:  1816258 88b2d95305265f79a79ae6fcc83d2e2f

  HP Precision architecture:
      Size/MD5 checksum:    77906 64dc5c615e2e08eea14e63ed0d2c7d64
      Size/MD5 checksum:   128022 631e0454bc5b6af236ea5e5367a517a8
      Size/MD5 checksum:    88550 d8f28ec0ead7cff9a102b4a33f4ddceb
      Size/MD5 checksum:   128476 d692c9ae37b89cba726d562da1fc67fe
      Size/MD5 checksum:  1410098 20a2a03d36bdda73a41046f381024997

  Motorola 680x0 architecture:
      Size/MD5 checksum:    62220 5a6bdfef95705506b487e0bd714461a7
      Size/MD5 checksum:   105320 ef901e9253a91724f49bbd89dca76858
      Size/MD5 checksum:    69546 edbeff4a313dbada606d02b689ce7340
      Size/MD5 checksum:   105552 2239fe471e08a1723b2dbc8a880598f3
      Size/MD5 checksum:  1118998 22ca4cce7c7cea705a13469aa8741d93

  Big endian MIPS architecture:
      Size/MD5 checksum:    68632 fa668ac909987ae3a67962c71d7e89fc
      Size/MD5 checksum:   119972 4fdf6339e9a93dc3774c0f24d2cc20df
      Size/MD5 checksum:    75434 688b39e02e20b00e69a9d4a5ddb522d5
      Size/MD5 checksum:   120324 9988fa00dce2d70433a79455e410753b
      Size/MD5 checksum:  1671124 f43bfd87357a69ce2a895c419b5add32

  Little endian MIPS architecture:
      Size/MD5 checksum:    68336 3557cfcf06a048a93ce5908110c03bf5
      Size/MD5 checksum:   120066 b7aebf7f19258394dd033d3d3a355ab7
      Size/MD5 checksum:    75096 2c9fde50576a752ade83a481febd97d4
      Size/MD5 checksum:   120386 ea894ecc6f93e16ad3e1fc4eb3f4f08e
      Size/MD5 checksum:  1677952 4a1cc9f74dc560332ce416344cc19154

  PowerPC architecture:
      Size/MD5 checksum:    71068 00d0741c15434913e71d01e51e2e0c6d
      Size/MD5 checksum:   123548 f38add811d922e9dbfe76eab00926bb5
      Size/MD5 checksum:    83270 963f88dcb0f361088546b88b83500dec
      Size/MD5 checksum:   123850 6cfab6f90e89eda61e4c2bbf2043e74b
      Size/MD5 checksum:  1521270 1f73b1be18a046983600647ff5b18510

  IBM S/390 architecture:
      Size/MD5 checksum:    70380 958181f098270add6a248c92e928bcdd
      Size/MD5 checksum:   115142 f4917540d6d715bc7f529ebd43a4670b
      Size/MD5 checksum:    77554 8a5317a38dbf79861398e3397b22f980
      Size/MD5 checksum:   115594 3cfc3d5c01ff2d31f24cbb3ae9d0fe6d
      Size/MD5 checksum:  1256716 e7aa9837a78d34e795047737e3a2485b

  Sun Sparc architecture:
      Size/MD5 checksum:    67686 5be787ff8cc66de7eaa152485696661c
      Size/MD5 checksum:   117226 4944608ebfae97bac7f6ef35f2931faa
      Size/MD5 checksum:    74430 6db0f77ce24aa7df0c4d5cf3306fd837
      Size/MD5 checksum:   117610 7a4293464c5613cb4ec32c720c2c7295
      Size/MD5 checksum:  1279266 69bde0791094cfc352d5b5dc8d3680c6

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"69","type":"x","order":"1","pct":75.82,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"14","type":"x","order":"2","pct":15.38,"resources":[]},{"id":"181","title":"Hardly ever","votes":"8","type":"x","order":"3","pct":8.79,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.