CImg The CImg Library v.2.3.3 and earlier is affected by: command injection. The impact is: RCE. The component is: load_network() function. The attack vector is: Loading an image from a user-controllable url can lead to command injection, because no string sanitization is done on the url. The fixed version is: v.2.3.4.
{ "binaries": [ { "binary_name": "gimp-gmic", "binary_version": "1.6.8-3" }, { "binary_name": "gmic", "binary_version": "1.6.8-3" }, { "binary_name": "gmic-zart", "binary_version": "1.6.8-3" }, { "binary_name": "libgmic-dev", "binary_version": "1.6.8-3" }, { "binary_name": "libgmic1", "binary_version": "1.6.8-3" } ] }
{ "binaries": [ { "binary_name": "gimp-gmic", "binary_version": "1.7.9+zart-4build3" }, { "binary_name": "gmic", "binary_version": "1.7.9+zart-4build3" }, { "binary_name": "gmic-zart", "binary_version": "1.7.9+zart-4build3" }, { "binary_name": "libgmic-dev", "binary_version": "1.7.9+zart-4build3" }, { "binary_name": "libgmic1", "binary_version": "1.7.9+zart-4build3" } ] }
{ "binaries": [ { "binary_name": "gimp-gmic", "binary_version": "2.4.5-1.1" }, { "binary_name": "gmic", "binary_version": "2.4.5-1.1" }, { "binary_name": "gmic-zart", "binary_version": "2.4.5-1.1" }, { "binary_name": "krita-gmic", "binary_version": "2.4.5-1.1" }, { "binary_name": "libgmic-dev", "binary_version": "2.4.5-1.1" }, { "binary_name": "libgmic1", "binary_version": "2.4.5-1.1" } ] }
{ "binaries": [ { "binary_name": "gimp-gmic", "binary_version": "2.9.4-4build1" }, { "binary_name": "gmic", "binary_version": "2.9.4-4build1" }, { "binary_name": "gmic-zart", "binary_version": "2.9.4-4build1" }, { "binary_name": "krita-gmic", "binary_version": "2.9.4-4build1" }, { "binary_name": "libgmic-dev", "binary_version": "2.9.4-4build1" }, { "binary_name": "libgmic1", "binary_version": "2.9.4-4build1" } ] }