ImageMagick, imlib and imlib2 contain exploitable buffer overflow vulnerabilities in the BMP image processing code.
|Package||media-gfx/imagemagick on all architectures|
|Affected versions||< 188.8.131.52|
|Unaffected versions||>= 184.108.40.206|
|Package||media-libs/imlib on all architectures|
|Affected versions||< 1.9.14-r2|
|Unaffected versions||>= 1.9.14-r2|
|Package||media-libs/imlib2 on all architectures|
|Affected versions||< 1.1.2|
|Unaffected versions||>= 1.1.2|
ImageMagick is a suite of image manipulation utilities and libraries used for a wide variety of image formats. imlib is a general image loading and rendering library.
Due to improper bounds checking, ImageMagick and imlib are vulnerable to a buffer overflow when decoding runlength-encoded bitmaps. This bug can be exploited using a specially-crafted BMP image and could potentially allow remote code execution when this image is decoded by the user.
A specially-crafted runlength-encoded BMP could lead ImageMagick and imlib to crash or potentially execute arbitrary code.
There is no known workaround at this time.
All ImageMagick users should upgrade to the latest version:
# emerge sync # emerge -pv ">=media-gfx/imagemagick-220.127.116.11" # emerge ">=media-gfx/imagemagick-18.104.22.168"
All imlib users should upgrade to the latest version:
# emerge sync # emerge -pv ">=media-libs/imlib-1.9.14-r2" # emerge ">=media-libs/imlib-1.9.14-r2"
All imlib2 users should upgrade to the latest version:
# emerge sync # emerge -pv ">=media-libs/imlib2-1.1.2" # emerge ">=media-libs/imlib2-1.1.2"