blob: 76f1525cfe4ac0c94a7a101f90db9c4b3f82b963 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
|
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200501-19">
<title>imlib2: Buffer overflows in image decoding</title>
<synopsis>
Multiple overflows have been found in the imlib2 library image decoding
routines, potentially allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">imlib2</product>
<announced>2005-01-11</announced>
<revised>2005-01-11: 01</revised>
<bug>77002</bug>
<access>remote</access>
<affected>
<package name="media-libs/imlib2" auto="yes" arch="*">
<unaffected range="ge">1.2.0</unaffected>
<vulnerable range="lt">1.2.0</vulnerable>
</package>
</affected>
<background>
<p>
imlib2 is an advanced replacement for image manipulation libraries
such as libXpm. It is utilized by numerous programs, including gkrellm
and several window managers, to display images.
</p>
</background>
<description>
<p>
Pavel Kankovsky discovered that several buffer overflows found in
the libXpm library (see GLSA 200409-34) also apply to imlib (see GLSA
200412-03) and imlib2. He also fixed a number of other potential
security vulnerabilities.
</p>
</description>
<impact type="normal">
<p>
A remote attacker could entice a user to view a carefully-crafted
image file, which would potentially lead to the execution of arbitrary
code with the rights of the user viewing the image. This affects any
program that utilizes of the imlib2 library.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All imlib2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.2.0"</code>
</resolution>
<references>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
<uri link="https://security.gentoo.org/glsa/glsa-200412-03.xml">GLSA 200412-03</uri>
</references>
<metadata tag="requester" timestamp="2005-01-08T09:59:17Z">
koon
</metadata>
<metadata tag="submitter" timestamp="2005-01-09T05:41:55Z">
dmargoli
</metadata>
<metadata tag="bugReady" timestamp="2005-01-10T22:14:19Z">
koon
</metadata>
</glsa>
|