Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

netpbm-10.30-2tr RPM for i586

From Trustix 3.0 for i586

Name: netpbm Distribution: Trustix Secure Linux
Version: 10.30 Vendor: Comodo Trustix
Release: 2tr Build date: Thu Jun 22 12:48:09 2006
Group: Trustix Official Build host: ttrmgtnived.comodo.net
Size: 320084 Source RPM: netpbm-10.30-2tr.src.rpm
Packager: Comodo Trustix <http://www.trustix.com>
Url: http://netpbm.sourceforge.net
Summary: A library for handling different graphics file formats.
The netpbm package contains a library of functions which support
programs for handling various graphics file formats, including .pbm
(portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps),
.ppm (portable pixmaps) and others.

Provides

Requires

License

freeware

Changelog

* Thu Jun 22 2006 Nived Gopalan <nived at trustix dot org> 10.30-2tr
  - SECURITY Fix: A vulnerability has been reported in NetPBM, caused due
    to an off-by-one boundary error within "pamtofits". This can be 
    exploited to cause a single byte buffer overflow when processing
    a specially crafted input file.
* Fri Oct 21 2005 Nived Gopalan <nived at comodo dot com> 10.30-1tr
  - New upstream. 
  - SECURITY Fix: Bastien Nocera has reported a vulnerability in NetPBM, 
    which potentially can be exploited by malicious people to cause a DoS.
    The vulnerability is caused due to the use of uninitialised variables by 
    "pnmtopng" in the "closestColorInPalette()" function.
  
    The Common Vulnerabilities and Exposures project has assigned the
    name CAN-2005-2978 to this issue.
* Tue Jul 26 2005 Hasher Jamaludeen <hasher at comodo dot com> 10.27-4tr
  - Security Fix: Max Vozeler has reported a vulnerability in netpbm, which
    can be exploited by malicious people to compromise a vulnerable system.
  
    The vulnerability is caused due to pstopnm not using the "-dSAFER" option
    when calling GhostScript to convert a PostScript file into a PBM, PGM, or 
    PNM file. This allows a malicious PostScript file to execute arbitrary 
    commands on a vulnerable system.
* Mon Apr 11 2005 Syed Shabir Zakiullah <syedshabir at comodo dot com> 10.27-2tr
  - Fixed Permission Bug { Bugzilla Bug ID #240 }
* Fri Apr 01 2005 Syed Shabir Zakiullah <syedshabir at comodo dot com> 10.27-1tr
  - Initial Spec for TSL-3.0

Files

/usr/lib/libnetpbm.so.10
/usr/lib/libnetpbm.so.10.30
/usr/share/doc/netpbm-10.30
/usr/share/doc/netpbm-10.30/COPYRIGHT.PATENT
/usr/share/doc/netpbm-10.30/GPL_LICENSE.txt
/usr/share/doc/netpbm-10.30/HISTORY
/usr/share/doc/netpbm-10.30/README


Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Aug 10 13:02:42 2014