ArchLinux: 202012-2: cimg: arbitrary code execution
Summary
A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.
Resolution
Upgrade to 2.9.4-1.
# pacman -Syu "cimg>=2.9.4-1"
The problem has been fixed upstream in version 2.9.4.
References
https://github.com/GreycLab/CImg/pull/295 https://github.com/GreycLab/CImg/commit/7db6d08355d09414d407e26aac10bb5825343e3a https://security.archlinux.org/CVE-2020-25693
Workaround
None.