An issue in the imlibloadimagewitherror_return function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
{ "binaries": [ { "binary_name": "libimlib2", "binary_version": "1.4.6-2ubuntu0.1" }, { "binary_name": "libimlib2-dev", "binary_version": "1.4.6-2ubuntu0.1" } ] }
{ "binaries": [ { "binary_name": "libimlib2", "binary_version": "1.4.7-1ubuntu0.1" }, { "binary_name": "libimlib2-dev", "binary_version": "1.4.7-1ubuntu0.1" } ] }
{ "binaries": [ { "binary_name": "libimlib2", "binary_version": "1.4.10-1" }, { "binary_name": "libimlib2-dev", "binary_version": "1.4.10-1" } ] }
{ "binaries": [ { "binary_name": "libimlib2", "binary_version": "1.6.1-1ubuntu0.1" }, { "binary_name": "libimlib2-dev", "binary_version": "1.6.1-1ubuntu0.1" } ] }
{ "binaries": [ { "binary_name": "libimlib2", "binary_version": "1.7.4-1build1" }, { "binary_name": "libimlib2-dev", "binary_version": "1.7.4-1build1" } ] }