blob: d2e5a0c5d4d197fa490e82955066472f79a57646 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
|
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200412-03">
<title>imlib: Buffer overflows in image decoding</title>
<synopsis>
Multiple overflows have been found in the imlib library image decoding
routines, potentially allowing execution of arbitrary code.
</synopsis>
<product type="ebuild">imlib</product>
<announced>2004-12-06</announced>
<revised count="01">2004-12-06</revised>
<bug>72681</bug>
<access>remote</access>
<affected>
<package name="media-libs/imlib" auto="yes" arch="*">
<unaffected range="ge">1.9.14-r3</unaffected>
<vulnerable range="le">1.9.14-r2</vulnerable>
</package>
</affected>
<background>
<p>
imlib is an advanced replacement library for image manipulation
libraries like libXpm. It is called by numerous programs, including
gkrellm and several window managers, to help in displaying images.
</p>
</background>
<description>
<p>
Pavel Kankovsky discovered that several overflows found in the
libXpm library (see GLSA 200409-34) also applied to imlib. He also
fixed a number of other potential flaws.
</p>
</description>
<impact type="normal">
<p>
A remote attacker could entice a user to view a carefully-crafted
image file, which would potentially lead to execution of arbitrary code
with the rights of the user viewing the image. This affects any program
that makes use of the imlib library.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All imlib users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/imlib-1.9.14-r3"</code>
</resolution>
<references>
<uri link="https://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
</references>
<metadata tag="submitter" timestamp="2004-12-06T09:59:18Z">
koon
</metadata>
<metadata tag="bugReady" timestamp="2004-12-06T09:59:29Z">
koon
</metadata>
</glsa>
|