Marc Schoenefeld found a stack-based buffer overflow in the way netpbm graphics file formats handling library used to process content of header fields of the X PixMap (XPM) image file. A remote attacker could provide a specially-crafted XPM image file and trick the local user into processing it, which would lead to denial of service (crash of application using the netpbm library) or, potentially, to execution of arbitrary code with the privileges of that application.
Подготовил исправление для Sisyphus: http://git.altlinux.org/people/crux/packages/?p=netpbm.git;a=summary Исправление для бранчей также можно подготовить (пример в бранче M51) Если замечаний не будет, то можно будет отправить на сборку.
fixed in 10.35.73-alt1