netpbm-10.35.58-8.AXS3.3
エラータID: AXSA:2011-558:01
The netpbm package contains a library of functions which support programs for handling various graphics file formats, including .pbm (portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps), .ppm (portable pixmaps) and others.
Security issues fixed with this release:
CVE-2009-4274
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
CVE-2011-4516
Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a JPEG2000 file.
CVE-2011-4517
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a malformed JPEG2000 file.
Update packages.
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
N/A
SRPMS
- netpbm-10.35.58-8.AXS3.3.src.rpm
MD5: 45fe196dabd240d958e8ba08a734c263
SHA-256: 3f7dd7788ba60c68b7be88c08dd52d8a1026394e54ee86b0852c929108a91a65
Size: 2.64 MB
Asianux Server 3 for x86
- netpbm-10.35.58-8.AXS3.3.i386.rpm
MD5: a1e44a3f17884d84eed9596382494386
SHA-256: 647d1ae58a279fe6bbf65297f53a42fb335db506aa31f491eaeb4c75c6181418
Size: 843.86 kB - netpbm-devel-10.35.58-8.AXS3.3.i386.rpm
MD5: a331bcb72e0e976a4e51f3174ca3ab31
SHA-256: 83cf5d3bda0a77d83aab5b6737d810ebc536d273275a25f9ec4fbbf6771dcabf
Size: 175.86 kB - netpbm-progs-10.35.58-8.AXS3.3.i386.rpm
MD5: 2c9d849e60be283a6f604990469af06e
SHA-256: 0866d8ed3baf3fe754b022ae67d41ea373736eff44a1c563932a0bf66c003bda
Size: 2.00 MB
Asianux Server 3 for x86_64
- netpbm-10.35.58-8.AXS3.3.x86_64.rpm
MD5: ec359310009364cf0a435e8ee357ee22
SHA-256: 55655770f851b0b06f3fa0ae539a59419dbeeca98cc4bf508a62c5c0e6137872
Size: 846.01 kB - netpbm-devel-10.35.58-8.AXS3.3.x86_64.rpm
MD5: c2165379f0f4c89e430756fc74dba00b
SHA-256: 7fdfb92da5c68e984c4e58364b8366a1554b6317a2d2c99157c71581f2d9b195
Size: 178.65 kB - netpbm-progs-10.35.58-8.AXS3.3.x86_64.rpm
MD5: 3a6117aef8113528ac8a6caa7cec64ad
SHA-256: bfdd606870da2df35097c897597bb297c27e5c67bfc7f0106dab70501dad60d0
Size: 2.00 MB