Security: imlib2 packages fix arbitrary code execution

Posted on in Categories Debian Linux, Linux, package management, RedHat/Fedora Linux, Security Alert last updated May 11, 2008

Almost all Linux distros and other UNIX like operating systems are affected by new local and remote buffer overflows arbitrary code execution errors. Stefan Cornelius discovered two buffer overflows in Imlib’s – a powerful image loading and rendering library – image loaders for PNM and XPM images, which may result in the execution of arbitrary code.

=> Package : imlib2
=> Vulnerability : buffer overflows
=> Problem type : local(remote)
=> Debian-specific: no
=> CVE Id(s) : CVE-2008-2426

Fix For Debian / Ubuntu Linux users

Type the following commands:
# apt-get update
# apt-get upgrade

OR download updated version from Debian web site.

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin and a trainer for the Linux operating system/Unix shell scripting. He has worked with global clients and in various industries, including IT, education, defense and space research, and the nonprofit sector. Follow him on Twitter, Facebook, Google+.

Leave a Comment