[libimager-perl] [CVE-2007-2459] buffer overflow which could allow the execution of arbitrary code
Bug #195688 reported by
disabled.user
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
libimager-perl (Debian) |
Fix Released
|
Unknown
|
|||
libimager-perl (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Dapper |
Won't Fix
|
Undecided
|
Unassigned | ||
Edgy |
Won't Fix
|
Undecided
|
Unassigned | ||
Feisty |
Won't Fix
|
Undecided
|
Unassigned | ||
Gutsy |
Invalid
|
Undecided
|
Unassigned | ||
Hardy |
Invalid
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: libimager-perl
References:
DSA-1498-1 (http://
Quoting:
"It was discovered that libimager-perl, a Perl extension for Generating 24
bit images, did not correctly handle 8-bit per-pixel compressed images,
which could allow the execution of arbitrary code."
CVE References
Changed in libimager-perl: | |
status: | Unknown → Fix Released |
Changed in libimager-perl: | |
status: | New → Confirmed |
status: | New → Confirmed |
status: | New → Confirmed |
status: | New → Invalid |
status: | New → Invalid |
To post a comment you must log in.
Ubuntu Edgy Eft is no longer supported, so a SRU will not be issued for this release. Marking Edgy as Won't Fix.