Debian Security Advisory
DSA-916-1 inkscape -- buffer overflow
- Date Reported:
- 07 Dec 2005
- Affected Packages:
- inkscape
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 321501, Bug 330894.
In the Bugtraq database (at SecurityFocus): BugTraq ID 14522.
In Mitre's CVE dictionary: CVE-2005-3737, CVE-2005-3885. - More information:
-
Several vulnerabilities have been discovered in Inkscape, a vector-based drawing program. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2005-3737
Joxean Koret discovered a buffer overflow in the SVG parsing routines that can lead to the execution of arbitrary code.
- CVE-2005-3885
Javier Fernández-Sanguino Peña noticed that the ps2epsi extension shell script uses a hardcoded temporary file making it vulnerable to symlink attacks.
The old stable distribution (woody) does not contain inkscape packages.
For the stable distribution (sarge) this problem has been fixed in version 0.41-4.99.sarge2.
For the unstable distribution (sid) this problem has been fixed in version 0.42.2+0.43pre1-1.
We recommend that you upgrade your inkscape package.
- CVE-2005-3737
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2.dsc
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2.diff.gz
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41.orig.tar.gz
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.