exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 39340

Secunia Security Advisory 39340
Posted Apr 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for imlib2. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | 7df32f207efa69a9a88bab4e431f845e0a8b149abc588dd7a74cf3324a4a59be

Secunia Security Advisory 39340

Change Mirror Download
----------------------------------------------------------------------


Secunia CSI
+ Microsoft SCCM
-----------------------
= Extensive Patch Management

http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/


----------------------------------------------------------------------

TITLE:
Debian update for imlib2

SECUNIA ADVISORY ID:
SA39340

VERIFY ADVISORY:
http://secunia.com/advisories/39340/

DESCRIPTION:
Debian has issued an update for imlib2. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise an application using the library.

The vulnerabilities are caused due to errors within the ARGB, BMP,
JPEG, LBM, PNM, TGA, and XPM loaders, which can be exploited to cause
buffer overflows and potentially execute arbitrary code via specially
crafted images.

For more information:
SA32354

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 5.0 alias lenny --

Source archives:

http://security.debian.org/pool/updates/main/i/imlib2/imlib2_1.4.0-1.2+lenny1.dsc
Size/MD5 checksum: 1152 b7cae77599a1ea2301395e18937d7788
http://security.debian.org/pool/updates/main/i/imlib2/imlib2_1.4.0.orig.tar.gz
Size/MD5 checksum: 845017 1f7f497798e06085767d645b0673562a
http://security.debian.org/pool/updates/main/i/imlib2/imlib2_1.4.0-1.2+lenny1.diff.gz
Size/MD5 checksum: 58816 01418de90dce3c411ff6794b5d9e06cd

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_alpha.deb
Size/MD5 checksum: 238740 5d728b77bdaf3ad6c9b7ec58d6e0348f
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_alpha.deb
Size/MD5 checksum: 430388 688de8efff4ab7f8612e46ab68febd5e

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_amd64.deb
Size/MD5 checksum: 374282 62e14bee1f8870b98bf76c04e3e7145f
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_amd64.deb
Size/MD5 checksum: 220686 9d34ec5aa25ea6b531923d3db2553a4c

arm architecture (ARM)

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_arm.deb
Size/MD5 checksum: 340058 1e256f1b506e43e0c2d296fa6ea138ec
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_arm.deb
Size/MD5 checksum: 206844 ce0402a348fb8dba20940c71ddde04f2

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_armel.deb
Size/MD5 checksum: 342736 a9411677d132fbb85d89e0fae6edb22f
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_armel.deb
Size/MD5 checksum: 215890 c80a62ed059ffd37d759e9192a22f220

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_hppa.deb
Size/MD5 checksum: 389348 7800351accb00c01d81b7bf5a99b88d7
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_hppa.deb
Size/MD5 checksum: 227236 5b4a108161ef87f6907d35895bba46b9

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_i386.deb
Size/MD5 checksum: 208152 ae8a6d6ac41ea4969133270f73dae53f
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_i386.deb
Size/MD5 checksum: 334920 1fa233439d1346ff20e637648d9e878d

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_ia64.deb
Size/MD5 checksum: 461632 27e0586a22c9232dc7d878bc242b391b
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_ia64.deb
Size/MD5 checksum: 298746 133afe4b754ba5c17142e06afdfff6a1

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_mipsel.deb
Size/MD5 checksum: 372840 0acfa48bcf0b171c1eaee35a11669e76
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_mipsel.deb
Size/MD5 checksum: 210698 a15c7f21dd022c23f295a31c79073680

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_powerpc.deb
Size/MD5 checksum: 231286 10da4a38fe608c515dbc82b89fc6a3e4
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_powerpc.deb
Size/MD5 checksum: 366434 69765dba5758c6c1235beb51718107e0

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_s390.deb
Size/MD5 checksum: 379098 af33c3c32c9052bbbebf758d50a22f0a
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_s390.deb
Size/MD5 checksum: 222936 6c18d6389154cde30f4b671d596d9fc3

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/i/imlib2/libimlib2_1.4.0-1.2+lenny1_sparc.deb
Size/MD5 checksum: 199142 c24cd7954c44b0cf3b76f3e737d111a9
http://security.debian.org/pool/updates/main/i/imlib2/libimlib2-dev_1.4.0-1.2+lenny1_sparc.deb
Size/MD5 checksum: 338746 18ad88d5de59424416762f1ce448caa6

ORIGINAL ADVISORY:
DSA-2029-1:
http://lists.debian.org/debian-security-announce/2010/msg00069.html

OTHER REFERENCES:
SA32354:
http://secunia.com/advisories/32354/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close