≡ Menu

buffer overflows

Security Alert: Streamripper buffer overflow bug

Multiple buffer overflows involving HTTP header and playlist parsing have been discovered in streamripper (CVE-2007-4337, CVE-2008-4829).

For the stable distribution (etch), these problems have been fixed in version 1.61.27-1+etch1.

For the unstable distribution (sid) and the testing distribution (lenny), these problems have been fixed in version 1.63.5-2.

How do I fix this bug and update package?

Simply type the following two commands:
# apt-get update
# apt-get upgrade

Almost all Linux distros and other UNIX like operating systems are affected by new local and remote buffer overflows arbitrary code execution errors. Stefan Cornelius discovered two buffer overflows in Imlib's - a powerful image loading and rendering library - image loaders for PNM and XPM images, which may result in the execution of arbitrary code.

=> Package : imlib2
=> Vulnerability : buffer overflows
=> Problem type : local(remote)
=> Debian-specific: no
=> CVE Id(s) : CVE-2008-2426

Fix For Debian / Ubuntu Linux users

Type the following commands:
# apt-get update
# apt-get upgrade

OR download updated version from Debian web site.