------------------------------------------------------------------------- Debian LTS Advisory DLA-2553-2 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany March 08, 2021 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : xcftools Version : 1.0.7-6+deb9u2 CVE ID : CVE-2019-5086 CVE-2019-5087 Debian Bug : 945317 The patch to address CVE-2019-5086 and CVE-2019-5087 was not portable and did not work on 32 bit processor architectures. This update fixes the problem. For reference, the original advisory text follows. Claudio Bozzato of Cisco Talos discovered an exploitable integer overflow vulnerability in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools. An integer overflow can occur while walking through tiles that could be exploited to corrupt memory and execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file. For Debian 9 stretch, this problem has been fixed in version 1.0.7-6+deb9u2. We recommend that you upgrade your xcftools packages. For the detailed security status of xcftools please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xcftools Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part