Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 20 Nov 2008 20:35:31 -0500 (EST)
From: "Steven M. Christey" <>
Subject: Re: CVE Request: imlib2

SECUNIA:32796 suggests a Debian bug report, but I couldn't quickly find

Name: CVE-2008-5187
Status: Candidate
Reference: MLIST:[oss-security] 20081120 CVE Request: imlib2
Reference: URL:
Reference: SECUNIA:32796
Reference: URL:

The load function in the XPM loader for imlib2 1.4.2, and possibly
other versions, allows attackers to execute arbitrary code via a
crafted XPM file that triggers a "pointer arithmetic error" and a
heap-based buffer overflow, a different vulnerability than
CVE-2008-2426.  NOTE: the provenance of this information is unknown;
the details are obtained solely from third party information.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.