summaryrefslogtreecommitdiff
blob: 76f1525cfe4ac0c94a7a101f90db9c4b3f82b963 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200501-19">
  <title>imlib2: Buffer overflows in image decoding</title>
  <synopsis>
    Multiple overflows have been found in the imlib2 library image decoding
    routines, potentially allowing the execution of arbitrary code.
  </synopsis>
  <product type="ebuild">imlib2</product>
  <announced>2005-01-11</announced>
  <revised>2005-01-11: 01</revised>
  <bug>77002</bug>
  <access>remote</access>
  <affected>
    <package name="media-libs/imlib2" auto="yes" arch="*">
      <unaffected range="ge">1.2.0</unaffected>
      <vulnerable range="lt">1.2.0</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    imlib2 is an advanced replacement for image manipulation libraries
    such as libXpm. It is utilized by numerous programs, including gkrellm
    and several window managers, to display images.
    </p>
  </background>
  <description>
    <p>
    Pavel Kankovsky discovered that several buffer overflows found in
    the libXpm library (see GLSA 200409-34) also apply to imlib (see GLSA
    200412-03) and imlib2. He also fixed a number of other potential
    security vulnerabilities.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could entice a user to view a carefully-crafted
    image file, which would potentially lead to the execution of arbitrary
    code with the rights of the user viewing the image. This affects any
    program that utilizes of the imlib2 library.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All imlib2 users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib2-1.2.0"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
    <uri link="https://security.gentoo.org/glsa/glsa-200412-03.xml">GLSA 200412-03</uri>
  </references>
  <metadata tag="requester" timestamp="2005-01-08T09:59:17Z">
    koon
  </metadata>
  <metadata tag="submitter" timestamp="2005-01-09T05:41:55Z">
    dmargoli
  </metadata>
  <metadata tag="bugReady" timestamp="2005-01-10T22:14:19Z">
    koon
  </metadata>
</glsa>