Debian Security Advisory
DSA-3555-1 imlib2 -- security update
- Date Reported:
- 23 Apr 2016
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 639414, Bug 785369, Bug 819818, Bug 820206, Bug 821732.
In Mitre's CVE dictionary: CVE-2011-5326, CVE-2014-9771, CVE-2016-3993, CVE-2016-3994, CVE-2016-4024.
- More information:
Several vulnerabilities were discovered in imlib2, an image manipulation library.
Kevin Ryde discovered that attempting to draw a 2x1 radi ellipse results in a floating point exception.
It was discovered that an integer overflow could lead to invalid memory reads and unreasonably large memory allocations.
Yuriy M. Kaminskiy discovered that drawing using coordinates from an untrusted source could lead to an out-of-bound memory read, which in turn could result in an application crash.
Jakub Wilk discovered that a malformed image could lead to an out-of-bound read in the GIF loader, which may result in an application crash or information leak.
Yuriy M. Kaminskiy discovered an integer overflow that could lead to an insufficient heap allocation and out-of-bound memory write.
For the oldstable distribution (wheezy), these problems have been fixed in version 1.4.5-1+deb7u2.
For the stable distribution (jessie), these problems have been fixed in version 1.4.6-2+deb8u2.
For the unstable distribution (sid), these problems have been fixed in version 1.4.8-1.
We recommend that you upgrade your imlib2 packages.