Package: xli
Version: 1.17.0-16 (not installed)
Severity: grave
Justification: user security hole

[Cc:ing security, as Woody should be affected as well]

Multiple security problems in xli have been found by the Gentoo Security folks:

1. Shell meta characters are inaccurately escaped in compressed images
2. A buffer overflow in "Faces Project images" parsing allows execution of
   arbitrary code.
3. Insufficient validation of image properties in xli could potentially result
   in buffer management errors (no further information given wrt the impact of
   this vulnerability)

Fixes: All problems have been fixed in the latest xli (which doesn't have
overly many differences to the version in sid):
>Sun Feb 27 15:16:08 PST 2005
>
>Fix a security problem in the faces loader, a security problem when
>opening compressed files, and check for integer overflows in image data
>size calculations.

Note: There does only seem to be a CAN assignment for the faces overflow,
(CAN-2001-0775), not for the remaining issues. Could anyone from the
security team please request one?

Cheers,
         Moritz
-- 
Moritz Muehlenhoff [EMAIL PROTECTED]     fon: +49 421 22 232- 0
Development        Linux for Your Business       fax: +49 421 22 232-99
Univention GmbH    http://www.univention.de/   mobil: +49 175 22 999 23

-- System Information:
Debian Release: 3.0
Architecture: i386
Kernel: Linux anton 2.4.29-univention.1 #1 SMP Thu Jan 27 17:08:46 CET 2005 i686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to