DSA-1493-2 sdl-image1.2 -- buffer overflows

Related Vulnerabilities: CVE-2007-6697   CVE-2008-0544  

Several local/remote vulnerabilities have been discovered in the image loading library for the Simple DirectMedia Layer 1.2. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6697 Gynvael Coldwind discovered a buffer overflow in GIF image parsing, which could result in denial of service and potentially the execution of arbitrary code. CVE-2008-0544 It was discovered that a buffer overflow in IFF ILBM image parsing could result in denial of service and potentially the execution of arbitrary code. For the old stable distribution (sarge), these problems have been fixed in version 1.2.4-1etch1. Due to a copy & paste error etch1 was appended to the version number instead of sarge1. Since the update is otherwise technically correct, the update was not rebuilt on the buildd network. For the stable distribution (etch), these problems have been fixed in version 1.2.5-2+etch1. We recommend that you upgrade your sdl-image1.2 packages.

Debian Security Advisory

DSA-1493-2 sdl-image1.2 -- buffer overflows

Date Reported:
10 Feb 2008
Affected Packages:
sdl-image1.2
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2007-6697, CVE-2008-0544.
More information:

Several local/remote vulnerabilities have been discovered in the image loading library for the Simple DirectMedia Layer 1.2. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2007-6697

    Gynvael Coldwind discovered a buffer overflow in GIF image parsing, which could result in denial of service and potentially the execution of arbitrary code.

  • CVE-2008-0544

    It was discovered that a buffer overflow in IFF ILBM image parsing could result in denial of service and potentially the execution of arbitrary code.

For the old stable distribution (sarge), these problems have been fixed in version 1.2.4-1etch4. Due to a copy & paste error etch4 was appended to the version number instead of sarge1. Since the update is otherwise technically correct, the update was not rebuilt on the buildd network.

For the stable distribution (etch), these problems have been fixed in version 1.2.5-2+etch4.

We recommend that you upgrade your sdl-image1.2 packages.

Fixed in:

Debian GNU/Linux 3.1 (oldstable)

Source:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/sdl-image1.2_1.2.4-1etch4.diff.gz
http://security.debian.org/pool/updates/main/s/sdl-image1.2/sdl-image1.2_1.2.4-1etch4.dsc
http://security.debian.org/pool/updates/main/s/sdl-image1.2/sdl-image1.2_1.2.4.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_alpha.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_amd64.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_arm.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_hppa.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_i386.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_ia64.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_m68k.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_m68k.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_mips.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_mipsel.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_powerpc.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_s390.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.4-1etch4_sparc.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.4-1etch4_sparc.deb

Debian GNU/Linux 4.0 (stable)

Source:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/sdl-image1.2_1.2.5-2+etch4.dsc
http://security.debian.org/pool/updates/main/s/sdl-image1.2/sdl-image1.2_1.2.5-2+etch4.diff.gz
http://security.debian.org/pool/updates/main/s/sdl-image1.2/sdl-image1.2_1.2.5.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_alpha.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_amd64.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_arm.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_hppa.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_i386.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_ia64.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_mips.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_mipsel.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_powerpc.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_s390.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch4_sparc.deb
http://security.debian.org/pool/updates/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.