CImg The CImg Library v.2.3.3 and earlier is affected by: command injection. The impact is: RCE. The component is: load_network() function. The attack vector is: Loading an image from a user-controllable url can lead to command injection, because no string sanitization is done on the url. The fixed version is: v.2.3.4.
{
"binaries": [
{
"binary_version": "1.6.8-3",
"binary_name": "gimp-gmic"
},
{
"binary_version": "1.6.8-3",
"binary_name": "gmic"
},
{
"binary_version": "1.6.8-3",
"binary_name": "gmic-zart"
},
{
"binary_version": "1.6.8-3",
"binary_name": "libgmic-dev"
},
{
"binary_version": "1.6.8-3",
"binary_name": "libgmic1"
}
]
}{
"binaries": [
{
"binary_version": "1.7.9+zart-4build3",
"binary_name": "gimp-gmic"
},
{
"binary_version": "1.7.9+zart-4build3",
"binary_name": "gmic"
},
{
"binary_version": "1.7.9+zart-4build3",
"binary_name": "gmic-zart"
},
{
"binary_version": "1.7.9+zart-4build3",
"binary_name": "libgmic-dev"
},
{
"binary_version": "1.7.9+zart-4build3",
"binary_name": "libgmic1"
}
]
}{
"binaries": [
{
"binary_version": "2.4.5-1.1",
"binary_name": "gimp-gmic"
},
{
"binary_version": "2.4.5-1.1",
"binary_name": "gmic"
},
{
"binary_version": "2.4.5-1.1",
"binary_name": "gmic-zart"
},
{
"binary_version": "2.4.5-1.1",
"binary_name": "krita-gmic"
},
{
"binary_version": "2.4.5-1.1",
"binary_name": "libgmic-dev"
},
{
"binary_version": "2.4.5-1.1",
"binary_name": "libgmic1"
}
]
}{
"binaries": [
{
"binary_version": "2.9.4-4build1",
"binary_name": "gimp-gmic"
},
{
"binary_version": "2.9.4-4build1",
"binary_name": "gmic"
},
{
"binary_version": "2.9.4-4build1",
"binary_name": "gmic-zart"
},
{
"binary_version": "2.9.4-4build1",
"binary_name": "krita-gmic"
},
{
"binary_version": "2.9.4-4build1",
"binary_name": "libgmic-dev"
},
{
"binary_version": "2.9.4-4build1",
"binary_name": "libgmic1"
}
]
}