CVE-2008-6079

NameCVE-2008-6079
Descriptionimlib2 before 1.4.2 allows context-dependent attackers to have an unspecified impact via a crafted (1) ARGB, (2) BMP, (3) JPEG, (4) LBM, (5) PNM, (6) TGA, or (7) XPM file, related to "several heap and stack based buffer overflows - partly due to integer overflows."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2029-1
NVD severityhigh
Debian Bugs576469

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
imlib2 (PTS)stretch1.4.8-1fixed
buster1.5.1-1fixed
bullseye1.7.1-2fixed
bookworm, sid1.7.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
imlib2sourcelenny1.4.0-1.2+lenny1DSA-2029-1
imlib2source(unstable)1.4.2-1576469

Notes

poked upstream for more details

Search for package or bug name: Reporting problems