Subject: [ASA-202012-2] cimg: arbitrary code execution Arch Linux Security Advisory ASA-202012-2 ========================================= Severity: Medium Date : 2020-12-05 CVE-ID : CVE-2020-25693 Package : cimg Type : arbitrary code execution Remote : No Link : https://security.archlinux.org/AVG-1318 Summary ======= The package cimg before version 2.9.4-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 2.9.4-1. # pacman -Syu "cimg>=2.9.4-1" The problem has been fixed upstream in version 2.9.4. Workaround ========== None. Description =========== A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity. Impact ====== An attacker might be able to execute arbitrary code via a crafted PNM file. References ========== https://github.com/dtschump/CImg/pull/295 https://github.com/dtschump/CImg/commit/7db6d08355d09414d407e26aac10bb5825343e3a https://security.archlinux.org/CVE-2020-25693