Debian Security Advisory DSA 1493-2 (sdl-image1.2)

Summary
The remote host is missing an update to sdl-image1.2 announced via advisory DSA 1493-2.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201493-2
Insight
An oversight led to the version number of the Debian 4.0 `Etch' update for advisory DSA 1493-1 being lower than the version in the main archive, making it uninstallable. This update corrects the version number. For reference the full advisory is quoted below: Several local/remote vulnerabilities have been discovered in the image loading library for the Simple DirectMedia Layer 1.2. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6697 Gynvael Coldwind discovered a buffer overflow in GIF image parsing, which could result in denial of service and potentially the execution of arbitrary code. CVE-2008-0544 It was discovered that a buffer overflow in IFF ILBM image parsing could result in denial of service and potentially the execution of arbitrary code. For the stable distribution (etch), these problems have been fixed in version 1.2.5-2+etch1. For the old stable distribution (sarge), these problems have been fixed in version 1.2.4-1etch1. Due to a copy & paste error etch1 was appended to the version number instead of sarge1. Since the update is otherwise technically correct, the update was not rebuilt to the buildd network. We recommend that you upgrade your sdl-image1.2 packages.