|
|
Subscribe / Log in / New account

Arch Linux alert ASA-202012-2 (cimg)

From:  Remi Gacogne <rgacogne@archlinux.org>
To:  arch-security@archlinux.org
Subject:  [ASA-202012-2] cimg: arbitrary code execution
Date:  Wed, 09 Dec 2020 19:49:40 +0100
Message-ID:  <bec6a7ec-c45c-56ba-8e83-2bb3cf325813@archlinux.org>

Arch Linux Security Advisory ASA-202012-2 ========================================= Severity: Medium Date : 2020-12-05 CVE-ID : CVE-2020-25693 Package : cimg Type : arbitrary code execution Remote : No Link : https://security.archlinux.org/AVG-1318 Summary ======= The package cimg before version 2.9.4-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 2.9.4-1. # pacman -Syu "cimg>=2.9.4-1" The problem has been fixed upstream in version 2.9.4. Workaround ========== None. Description =========== A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity. Impact ====== An attacker might be able to execute arbitrary code via a crafted PNM file. References ========== https://github.com/dtschump/CImg/pull/295 https://github.com/dtschump/CImg/commit/7db6d08355d09414d... https://security.archlinux.org/CVE-2020-25693


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds