A security researcher has uncovered yet another set of security flaws in an image component, which could put Linux users at risk of system compromise if they view a maliciously crafted image.
The bugs, in the imlib image library found in most Linux systems, haven't been patched by the library's developer, but Linux vendors are currently rushing out patches. So far the Gentoo Foundation, Novell's Suse business unit and others have released fixes.
Researcher Pavel Kankovsky found that several integer overflows in image decoding routines could be exploited to cause buffer overflows and potentially execute malicious code on a user's system, according to advisories from Suse, Gentoo and independent security firm Secunia. The bugs can be exploited by tricking a user into viewing a specially crafted image in one of the many applications linked to imlib.
Imlib is one of the most popular image manipulation and rendering libraries available, according to open source developers, and was the rendering engine for the Gnome user interface until the release of Gnome 2.0.
In September a similar bug affected both imlib 1.x and imlib2 1.x. Other imaging-related components, in Linux, Windows and other platforms, have been hit by bugs this year. One of the most serious was a JPEG-rendering flaw in Windows, which was patched in mid-September. A few days later attackers began exploiting the flaw with pornographic images posted to Usenet news groups.