Debian: DSA-3555-1: imlib2 security update

    Date23 Apr 2016
    CategoryDebian
    129
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities were discovered in imlib2, an image manipulation library. CVE-2011-5326
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3555-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Alessandro Ghedini
    April 23, 2016                        https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : imlib2
    CVE ID         : CVE-2011-5326 CVE-2014-9771 CVE-2016-3993 CVE-2016-3994
                     CVE-2016-4024
    Debian Bug     : 639414 785369 819818 820206 821732
    
    Several vulnerabilities were discovered in imlib2, an image manipulation
    library.
    
    CVE-2011-5326
    
        Kevin Ryde discovered that attempting to draw a 2x1 radi ellipse
        results in a floating point exception.
    
    CVE-2014-9771
    
        It was discovered that an integer overflow could lead to invalid
        memory reads and unreasonably large memory allocations.
    
    CVE-2016-3993
    
        Yuriy M. Kaminskiy discovered that drawing using coordinates from
        an untrusted source could lead to an out-of-bound memory read, which
        in turn could result in an application crash.
    
    CVE-2016-3994
    
        Jakub Wilk discovered that a malformed image could lead to an
        out-of-bound read in the GIF loader, which may result in an
        application crash or information leak.
    
    CVE-2016-4024
    
        Yuriy M. Kaminskiy discovered an integer overflow that could lead to
        an insufficient heap allocation and out-of-bound memory write.
    
    For the oldstable distribution (wheezy), these problems have been fixed
    in version 1.4.5-1+deb7u2.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 1.4.6-2+deb8u2.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 1.4.8-1.
    
    We recommend that you upgrade your imlib2 packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.