Security: imlib2 packages fix arbitrary code execution

last updated in Categories Debian Linux, Linux, package management, RedHat/Fedora Linux, Security Alert

Almost all Linux distros and other UNIX like operating systems are affected by new local and remote buffer overflows arbitrary code execution errors. Stefan Cornelius discovered two buffer overflows in Imlib’s – a powerful image loading and rendering library – image loaders for PNM and XPM images, which may result in the execution of arbitrary code.

=> Package : imlib2
=> Vulnerability : buffer overflows
=> Problem type : local(remote)
=> Debian-specific: no
=> CVE Id(s) : CVE-2008-2426

Fix For Debian / Ubuntu Linux users

Type the following commands:
# apt-get update
# apt-get upgrade

OR download updated version from Debian web site.

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

Share this on (or read 0 comments/add one below):