Ubuntu USN-744-1 (lcms)

Summary
The remote host is missing an update to lcms announced via advisory USN-744-1.
Solution
The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: liblcms1 1.13-1ubuntu0.2 Ubuntu 7.10: liblcms1 1.16-5ubuntu3.2 python-liblcms 1.16-5ubuntu3.2 Ubuntu 8.04 LTS: liblcms1 1.16-7ubuntu1.2 python-liblcms 1.16-7ubuntu1.2 Ubuntu 8.10: liblcms1 1.16-10ubuntu0.2 python-liblcms 1.16-10ubuntu0.2 In general, a standard system upgrade is sufficient to effect the necessary changes. https://secure1.securityspace.com/smysecure/catid.html?in=USN-744-1
Insight
Chris Evans discovered that LittleCMS did not properly handle certain error conditions, resulting in a large memory leak. If a user or automated system were tricked into processing an image with malicious ICC tags, a remote attacker could cause a denial of service. (CVE-2009-0581) Chris Evans discovered that LittleCMS contained multiple integer overflows. If a user or automated system were tricked into processing an image with malicious ICC tags, a remote attacker could crash applications linked against liblcms1, leading to a denial of service, or possibly execute arbitrary code with user privileges. (CVE-2009-0723) Chris Evans discovered that LittleCMS did not properly perform bounds checking, leading to a buffer overflow. If a user or automated system were tricked into processing an image with malicious ICC tags, a remote attacker could execute arbitrary code with user privileges. (CVE-2009-0733)