Your message dated Sat, 31 May 2008 15:38:21 +0200
with message-id <[EMAIL PROTECTED]>
and subject line closing duplicate
has caused the Debian Bug report #483818,
regarding imlib2: CVE-2008-2426 buffer overflows in xpm and pnm loader
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
483818: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483818
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libimlib2
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libimlib2.


CVE-2008-2426[0]:
| Secunia Research has discovered two vulnerabilities in imlib2, which
| can be exploited by malicious people to cause a DoS (Denial of
| Service) or compromise an application using the library.
|
| 1) A boundary error exists within the "load()" function in
| src/modules/loaders/loader_pnm.c when processing the header of a
| PNM image file. This can be exploited to cause a stack-based buffer
| overflow by e.g. tricking a user into opening a specially crafted
| PNM image in an application using the imlib2 library.
|
| Successful exploitation allows execution of arbitrary code.
|
| 2) A boundary error exists within the "load()" function in
| src/modules/loader_xpm.c when processing an XPM image file. This can
| be exploited to cause a stack-based buffer overflow by e.g. tricking
| a user into opening a specially crafted XPM image with an application
| using the imlib2 library.

Patches:
https://bugzilla.redhat.com/attachment.cgi?id=307178
https://bugzilla.redhat.com/attachment.cgi?id=307177

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2426
    http://security-tracker.debian.net/tracker/CVE-2008-2426   




--- End Message ---
--- Begin Message ---
closing this duplicate

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


--- End Message ---

Reply via email to