USN-217-1: Inkscape vulnerability
Posted on: 11/21/2005 01:32 PM

A new Inkscape vulnerability update is available for Ubuntu Linux. Here the announcement:

Ubuntu Security Notice USN-217-1 November 21, 2005
inkscape vulnerability
https://bugzilla.ubuntu.com/show_bug.cgi?id689
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

inkscape

The problem can be corrected by upgrading the affected package to
version 0.42-1build1ubuntu0.1. In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

A buffer overflow has been discovered in the SVG importer of Inkscape.
By tricking an user into opening a specially crafted SVG image this
could be exploited to execute arbitrary code with the privileges of
the Inkscape user.


Source archives:

http://security.ubuntu.com/ubuntu/pool/main/i/inkscape/inkscape_0.42-1build1ubuntu0.1.diff.gz
Size/MD5: 10300 aab0371eeb7acc19bda38001bbd1078b
http://security.ubuntu.com/ubuntu/pool/main/i/inkscape/inkscape_0.42-1build1ubuntu0.1.dsc
Size/MD5: 899 05b5cf52889e486853d82387455f762d
http://security.ubuntu.com/ubuntu/pool/main/i/inkscape/inkscape_0.42.orig.tar.gz
Size/MD5: 8001602 653c81be2fc7c80fd9895e908d3a73f1

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/i/inkscape/inkscape_0.42-1build1ubuntu0.1_amd64.deb
Size/MD5: 6371584 815a67dfa762303a904bc730e19e8076

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/i/inkscape/inkscape_0.42-1build1ubuntu0.1_i386.deb
Size/MD5: 5934122 b1aff8ba5a839cf845b8e6dafe075a5c

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/i/inkscape/inkscape_0.42-1build1ubuntu0.1_powerpc.deb
Size/MD5: 6329126 09dfb3b30c3fd8d31f43bc1fbbbed7eb

--SkvwRMAIpAhPCcCJ
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDgazQDecnbV4Fd/IRAujsAKCXSzhEW8BOjUMV43D/zGDlpNAr1ACg1qoK
Ix5T726GKCtikwM9xckRyiQ=
=LbPq
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/usn_217_1_inkscape_vulnerability.html)