Ubuntu Security Notice USN-697-1 - It was discovered that Imlib2 did not correctly handle certain malformed XPM and PNG images. If a user were tricked into opening a specially crafted image with an application that uses Imlib2, an attacker could cause a denial of service and possibly execute arbitrary code with the user's privileges.
d653df98d6170f274789b6210547268ba1a992b3243a8145e834c36ac982ae95
Mandriva Linux Security Advisory - Stefan Cornelius discovered two buffer overflows in Imlib's image loaders for PNM and XPM images, which could possibly result in the execution of arbitrary code.
6816ba50197194116c78c323fcd4a78253b0ed1edbe8bd4fccfda86f95bd373f
Debian Security Advisory 1594-1 - Stefan Cornelius discovered two buffer overflows in Imlib's - a powerful image loading and rendering library - image loaders for PNM and XPM images, which may result in the execution of arbitrary code.
fbf8fd0c02278843b6f777e8167523433a53cd0698790bc57f9e0c8b89197723
Gentoo Linux Security Advisory GLSA 200806-03 - Two vulnerabilities in Imlib 2 may allow for the execution of arbitrary code. Versions less than 1.4.0-r1 are affected.
eb6bf6c4bbc3f360b5817ad957f55b07580f8ee8cff6424a2ec043ca50cc3510
Secunia Research has discovered two vulnerabilities in imlib2, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. imlib2 version 1.4.0 is affected.
492f91d706882a5fb47f967879cf1859be511b2b1b12b3b2a76195a3a3e14618