Debian Security Advisory DSA-3555-1 firstname.lastname@example.org https://www.debian.org/security/ Alessandro Ghedini April 23, 2016 https://www.debian.org/security/faq
Package : imlib2 CVE ID : CVE-2011-5326 CVE-2014-9771 CVE-2016-3993 CVE-2016-3994 CVE-2016-4024 Debian Bug : 639414 785369 819818 820206 821732
Several vulnerabilities were discovered in imlib2, an image manipulation library.
Kevin Ryde discovered that attempting to draw a 2x1 radi ellipse results in a floating point exception.
It was discovered that an integer overflow could lead to invalid memory reads and unreasonably large memory allocations.
Yuriy M. Kaminskiy discovered that drawing using coordinates from an untrusted source could lead to an out-of-bound memory read, which in turn could result in an application crash.
Jakub Wilk discovered that a malformed image could lead to an out-of-bound read in the GIF loader, which may result in an application crash or information leak.
Yuriy M. Kaminskiy discovered an integer overflow that could lead to an insufficient heap allocation and out-of-bound memory write.
For the oldstable distribution (wheezy), these problems have been fixed in version 1.4.5-1+deb7u2.
For the stable distribution (jessie), these problems have been fixed in version 1.4.6-2+deb8u2.
For the unstable distribution (sid), these problems have been fixed in version 1.4.8-1.
We recommend that you upgrade your imlib2 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: email@example.com