An issue in the imlibloadimagewitherror_return function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
{ "binaries": [ { "binary_version": "1.4.6-2ubuntu0.1", "binary_name": "libimlib2" }, { "binary_version": "1.4.6-2ubuntu0.1", "binary_name": "libimlib2-dev" } ] }
{ "binaries": [ { "binary_version": "1.4.7-1ubuntu0.1", "binary_name": "libimlib2" }, { "binary_version": "1.4.7-1ubuntu0.1", "binary_name": "libimlib2-dev" } ] }
{ "binaries": [ { "binary_version": "1.4.10-1", "binary_name": "libimlib2" }, { "binary_version": "1.4.10-1", "binary_name": "libimlib2-dev" } ] }
{ "binaries": [ { "binary_version": "1.6.1-1ubuntu0.1", "binary_name": "libimlib2" }, { "binary_version": "1.6.1-1ubuntu0.1", "binary_name": "libimlib2-dev" } ] }
{ "binaries": [ { "binary_version": "1.7.4-1build1", "binary_name": "libimlib2" }, { "binary_version": "1.7.4-1build1", "binary_name": "libimlib2-dev" } ] }