Summary: | media-gfx/optipng < 0.6.2 bmp buffer overflow (CVE-2008-5101) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Hanno Böck <hanno> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | tristan |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/Advisories/32651/ | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Hanno Böck
2008-11-12 18:26:32 UTC
Arches, please test and stabilize: =media-gfx/optipng-0.6.2 Target keywords: alpha amd64 ppc x86 amd64/x86 stable alpha stable ppc stable CVE-2008-5101 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5101): Buffer overflow in the BMP reader in OptiPNG 0.6 and 0.6.1 allows user-assisted attackers to execute arbitrary code via a crafted BMP image, related to an "array overflow." GLSA request filed. GLSA 200812-01 |