<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="15db54a6532ed13ddbf87c28308b83ed"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="imlib2-loaders-2261"
    timestamp="1163497309"
    engine="1.0">
  <yum:name>imlib2-loaders</yum:name>
  <summary lang="en">Security update for imlib2-loaders</summary>
  <summary lang="de">Security update for imlib2-loaders</summary>
  <description lang="en">Various security problems have been fixed in the imlib2
image loaders:

CVE-2006-4809: A stack buffer overflow in loader_pnm.c
could be used by attackers to execute code by supplying a
handcrafted PNM image.

CVE-2006-4808: A heap buffer overflow in loader_tga.c could
potentially be used by attackers to execute code by
supplying a handcrafted TGA image.

CVE-2006-4807: A out of bounds memory read in loader_tga.c
could be used to crash the imlib2 using application with a
handcrafted TGA image.

CVE-2006-4806: Various integer overflows in width*height
calculations could lead to heap overflows which could
potentially be used to execute code. Affected here are the
ARGB, PNG, LBM, JPEG and TIFF loaders.

Additionaly loading of TIFF images on 64bit systems now
works.

This obsoletes a previous update, which had broken JPEG
loading.
</description>
  <description lang="de">Various security problems have been fixed in the imlib2
image loaders:

CVE-2006-4809: A stack buffer overflow in loader_pnm.c
could be used by attackers to execute code by supplying a
handcrafted PNM image.

CVE-2006-4808: A heap buffer overflow in loader_tga.c could
potentially be used by attackers to execute code by
supplying a handcrafted TGA image.

CVE-2006-4807: A out of bounds memory read in loader_tga.c
could be used to crash the imlib2 using application with a
handcrafted TGA image.

CVE-2006-4806: Various integer overflows in width*height
calculations could lead to heap overflows which could
potentially be used to execute code. Affected here are the
ARGB, PNG, LBM, JPEG and TIFF loaders.

Additionaly loading of TIFF images on 64bit systems now
works.

This obsoletes a previous update, which had broken JPEG
loading.
</description>
  <yum:version ver="2261" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="imlib2-loaders" epoch="0" ver="1.2.1" rel="17.9" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>imlib2-loaders</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.2.1" rel="17.9"/>
      <checksum type="sha" pkgid="YES">7793a0ef426ecd4ed6d0c7590e18bba41a6c57a5</checksum>
      <time file="1163583243" build="1163497309"/>
      <size package="41939" installed="109101" archive="112956"/>
      <location xml:base="media://#1" href="suse/i586/imlib2-loaders-1.2.1-17.9.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="imlib2-loaders" epoch="0" ver="1.2.1" rel="17.9" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="imlib2-loaders"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
