Advisories
Mandriva Advisories
|
![]() |
Problem Description |
M Joonas Pihlaja discovered several vulnerabilities in the Imlib2
graphics library.
The load() function of several of the Imlib2 image loaders does not
check the width and height of an image before allocating memory. As a
result, a carefully crafted image file can trigger a segfault when an
application using Imlib2 attempts to view the image. (CVE-2006-4806)
The tga loader fails to bounds check input data to make sure the input
data doesn't load outside the memory mapped region. (CVE-2006-4807)
The RLE decoding loops of the load() function in the tga loader does
not check that the count byte of an RLE packet doesn't cause a heap
overflow of the pixel buffer. (CVE-2006-4808)
The load() function of the pnm loader writes arbitrary length user data
into a fixed size stack allocated buffer buf[] without bounds checking.
(CVE-2006-4809) Updated packages have been patched to correct these
issues.
Update:
An error in the previous patchset may affect JPEG image handling for
certain valid images. This new update corrects this issue.
Updated Packages |
Corporate Server 3.0
ef3cd741c034592c271bfffa31b5fd89 corporate/3.0/i586/libimlib2_1-1.0.6-4.4.C30mdk.i586.rpm c808de39609104891a3302b587b2898f corporate/3.0/i586/libimlib2_1-devel-1.0.6-4.4.C30mdk.i586.rpm 2cc5b0560275b6917d90fe8f014b466d corporate/3.0/i586/libimlib2_1-filters-1.0.6-4.4.C30mdk.i586.rpm 01b3b38db8e92c34167c2fa6ffe647bc corporate/3.0/i586/libimlib2_1-loaders-1.0.6-4.4.C30mdk.i586.rpm a14e20f0fae8209d5d82d1fb3e28a82d corporate/3.0/SRPMS/imlib2-1.0.6-4.4.C30mdk.src.rpm
Corporate Server 3.0/X86_64
a3a3ddac9e0364367134c2981007c96b corporate/3.0/x86_64/lib64imlib2_1-1.0.6-4.4.C30mdk.x86_64.rpm 511b57c0bfd6e4e8fcfd1a4f64ce28d4 corporate/3.0/x86_64/lib64imlib2_1-devel-1.0.6-4.4.C30mdk.x86_64.rpm 1393decfcd932de1e65123d5e76395fb corporate/3.0/x86_64/lib64imlib2_1-filters-1.0.6-4.4.C30mdk.x86_64.rpm b9e803f9ad9c34c1d25e48c9bbf06120 corporate/3.0/x86_64/lib64imlib2_1-loaders-1.0.6-4.4.C30mdk.x86_64.rpm a14e20f0fae8209d5d82d1fb3e28a82d corporate/3.0/SRPMS/imlib2-1.0.6-4.4.C30mdk.src.rpm
Mandriva Linux 2006
4cd544b96a2bcaed32012a3636628b32 2006.0/i586/imlib2-data-1.2.1-1.3.20060mdk.i586.rpm da17344a1e28fdfd4be087e9ec092a0c 2006.0/i586/libimlib2_1-1.2.1-1.3.20060mdk.i586.rpm f15225db7b1b03b814d263a42a304aad 2006.0/i586/libimlib2_1-devel-1.2.1-1.3.20060mdk.i586.rpm fa7f076f50636badeee3bfb7965675ab 2006.0/i586/libimlib2_1-filters-1.2.1-1.3.20060mdk.i586.rpm c0d54a209a44785ae720c5a4426dbd64 2006.0/i586/libimlib2_1-loaders-1.2.1-1.3.20060mdk.i586.rpm 6ebb0fd9da5156686618d43f2188c8ef 2006.0/SRPMS/imlib2-1.2.1-1.3.20060mdk.src.rpm
Mandriva Linux 2006/X86_64
1be1988c5aea7a22770c5d39675a321b 2006.0/x86_64/imlib2-data-1.2.1-1.3.20060mdk.x86_64.rpm fb2293ecdf47bda1e4d1ce67c9539442 2006.0/x86_64/lib64imlib2_1-1.2.1-1.3.20060mdk.x86_64.rpm 4d8beff4cb21b5e6003c46774ce04cd3 2006.0/x86_64/lib64imlib2_1-devel-1.2.1-1.3.20060mdk.x86_64.rpm 95ec706c26a480effa71ee7458f0523a 2006.0/x86_64/lib64imlib2_1-filters-1.2.1-1.3.20060mdk.x86_64.rpm 4f412783aef1934e0e8f7b2523b67b19 2006.0/x86_64/lib64imlib2_1-loaders-1.2.1-1.3.20060mdk.x86_64.rpm 6ebb0fd9da5156686618d43f2188c8ef 2006.0/SRPMS/imlib2-1.2.1-1.3.20060mdk.src.rpm
Mandriva Linux 2007
e5e136bb1d119892a4a2a4c87e9b3903 2007.0/i586/imlib2-data-1.2.2-3.2mdv2007.0.i586.rpm f0c1a6296bc04c896a37a432b9d2ee31 2007.0/i586/libimlib2_1-1.2.2-3.2mdv2007.0.i586.rpm edb6a88f3e8a9a268ebc2395919f2b78 2007.0/i586/libimlib2_1-devel-1.2.2-3.2mdv2007.0.i586.rpm 676be1d6f7d78da826dea6be8535c11e 2007.0/i586/libimlib2_1-filters-1.2.2-3.2mdv2007.0.i586.rpm 0a9bb4cd967f3286c90c65bd20c35e8a 2007.0/i586/libimlib2_1-loaders-1.2.2-3.2mdv2007.0.i586.rpm ce6b02c1d58cc7a6c7be69c0a84fba82 2007.0/SRPMS/imlib2-1.2.2-3.2mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
26e871cf8a946029fdc8a87d8d8fc16d 2007.0/x86_64/imlib2-data-1.2.2-3.2mdv2007.0.x86_64.rpm 6bde1a406b60edb87c1b57adbd04b36e 2007.0/x86_64/lib64imlib2_1-1.2.2-3.2mdv2007.0.x86_64.rpm c032f45d676b806b57d7b7496b7ba41c 2007.0/x86_64/lib64imlib2_1-devel-1.2.2-3.2mdv2007.0.x86_64.rpm e485af5e82b804ffec13ef705a02c2e8 2007.0/x86_64/lib64imlib2_1-filters-1.2.2-3.2mdv2007.0.x86_64.rpm 4a143c2997b57f00a27bc6c7ecce1e06 2007.0/x86_64/lib64imlib2_1-loaders-1.2.2-3.2mdv2007.0.x86_64.rpm ce6b02c1d58cc7a6c7be69c0a84fba82 2007.0/SRPMS/imlib2-1.2.2-3.2mdv2007.0.src.rpm
Corporate Server 4.0
855099dbe15e10e0a9717921a1627976 corporate/4.0/i586/imlib2-data-1.2.1-1.3.20060mlcs4.i586.rpm e53b851d8cd7d68193f566c30e71c329 corporate/4.0/i586/libimlib2_1-1.2.1-1.3.20060mlcs4.i586.rpm f04d6e820a44f73d97982ff0c191dd74 corporate/4.0/i586/libimlib2_1-devel-1.2.1-1.3.20060mlcs4.i586.rpm b978c2cad3d02cd65bdc564992071557 corporate/4.0/i586/libimlib2_1-filters-1.2.1-1.3.20060mlcs4.i586.rpm b1eb762b86e4fad4290da6d5ee4573aa corporate/4.0/i586/libimlib2_1-loaders-1.2.1-1.3.20060mlcs4.i586.rpm 7703412328a1508cec0a61661f373c1b corporate/4.0/SRPMS/imlib2-1.2.1-1.3.20060mlcs4.src.rpm
Corporate Server 4.0/X86_64
ccec9056b57574dd17bb56b4b1423567 corporate/4.0/x86_64/imlib2-data-1.2.1-1.3.20060mlcs4.x86_64.rpm 884dad892370cdbd3e693cbb0ee6cb2d corporate/4.0/x86_64/lib64imlib2_1-1.2.1-1.3.20060mlcs4.x86_64.rpm 6832b40e2e31f6244caff8818ee3d91c corporate/4.0/x86_64/lib64imlib2_1-devel-1.2.1-1.3.20060mlcs4.x86_64.rpm 1bce9e9f26e43af8625e83cb15792747 corporate/4.0/x86_64/lib64imlib2_1-filters-1.2.1-1.3.20060mlcs4.x86_64.rpm 57bf86f98c4595cd269723559de2bb9e corporate/4.0/x86_64/lib64imlib2_1-loaders-1.2.1-1.3.20060mlcs4.x86_64.rpm 7703412328a1508cec0a61661f373c1b corporate/4.0/SRPMS/imlib2-1.2.1-1.3.20060mlcs4.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4806
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.