I've prepared a debdiff from the patches used in debian.
>From the changelog:
* SECURITY UPDATE: Buffer owerflow in GIF handling; possible
denial of service and arbitrary code execution.
* SECURITY UPDATE: Buffer owerflow in IFF ILBM handling; possible
denial of service and arbitrary
** Changed in: sdl-image1.2 (Ubuntu)
Assignee: (unassigned) => awen (andreas-wenning)
Status: Confirmed => In Progress
--
Buffer overflow in GIF handling
https://bugs.launchpad.net/bugs/185782
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug
References:
DSA-1493-1 (http://www.debian.org/security/2008/dsa-1493)
Quoting:
"Several local/remote vulnerabilities have been discovered in the image
loading library for the Simple DirectMedia Layer 1.2. The Common
Vulnerabilities and Exposures project identifies the following problems:
CVE-20
marking as confirmed (should I set s.th. to gutsy here?)
** Changed in: sdl-image1.2 (Ubuntu)
Importance: Undecided => Medium
Status: New => Confirmed
--
Buffer overflow in GIF handling
https://bugs.launchpad.net/bugs/185782
You received this bug notification because you are a member o
Hi,
this is fixed in hardy already, however not yet in gutsy (hence leaving
the bug report open).
Cheers,
Stefan.
--
Buffer overflow in GIF handling
https://bugs.launchpad.net/bugs/185782
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact fo
I backported the fix to the current Gutsy version of sdl-image. A (tiny)
patch is attached.
** Attachment added: "Fix overflow"
http://launchpadlibrarian.net/11666365/img_GIF.c.diff
--
Buffer overflow in GIF handling
https://bugs.launchpad.net/bugs/185782
You received this bug notification be