Multiple heap buffer overflows caused by int overflow
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
| cimg (Ubuntu) |
Undecided
|
Unassigned | ||
| gmic (Ubuntu) |
Undecided
|
Unassigned |
Bug Description
The CImg library uses an unsafe pattern to calculate memory allocations size. At least in the PNM file format parser, an attacker can trivially supply width/height fields that overflow the heap and result in arbitrary heap writes. This probably also affects other file format parsers in CImg.
The most prominent user of CImg is gmic.
The gmic commandline tool directly exposes the load_pnm() functions (and also the other file format load functions) to the user and thus is affected.
The issue is public and fixed in:
https:/
Redhat bug:
https:/
https:/
CVE References
Kai Dietrich (0cs935kb517wwm-mail) wrote : | #1 |
summary: |
- Multiple heap buffer overflows by integer overflow + Multiple heap buffer overflows cause by integer overflow |
summary: |
- Multiple heap buffer overflows cause by integer overflow + Multiple heap buffer overflows caused by integer overflow |
summary: |
- Multiple heap buffer overflows caused by integer overflow + Multiple heap buffer overflows caused by int overflow |
description: | updated |
Eduardo Barretto (ebarretto) wrote : | #2 |
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/
tags: | added: community-security |
information type: | Private Security → Public Security |
Changed in cimg (Ubuntu): | |
status: | New → Confirmed |
Changed in gmic (Ubuntu): | |
status: | New → Confirmed |
description: | updated |
description: | updated |
No CVE assigned yet AFAIK.