CVE-2009-4274
Publication date 12 February 2010
Last updated 24 July 2024
Ubuntu priority
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Status
Package | Ubuntu Release | Status |
---|---|---|
netpbm-free | 10.04 LTS lucid |
Fixed 2:10.0-12.1ubuntu1
|
9.10 karmic |
Fixed 2:10.0-12ubuntu1.1
|
|
9.04 jaunty |
Fixed 2:10.0-12ubuntu0.9.04.1
|
|
8.10 intrepid |
Fixed 2:10.0-12ubuntu0.8.10.1
|
|
8.04 LTS hardy |
Fixed 2:10.0-11.1ubuntu0.1
|
|
6.06 LTS dapper | Ignored end of life |
Notes
Patch details
Package | Patch details |
---|---|
netpbm-free |