Severity: Medium Date : 2020-12-05 CVE-ID : CVE-2020-25693 Package : cimg Type : arbitrary code execution Remote : No Link : https://security.archlinux.org/AVG-1318
The package cimg before version 2.9.4-1 is vulnerable to arbitrary code execution.
Upgrade to 2.9.4-1.
The problem has been fixed upstream in version 2.9.4.
A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.
An attacker might be able to execute arbitrary code via a crafted PNM file.
https://github.com/dtschump/CImg/pull/295 https://github.com/dtschump/CImg/commit/7db6d08355d09414d407e26aac10bb5825343e3a https://security.archlinux.org/CVE-2020-25693