lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 23 Apr 2016 23:40:27 +0100 From: Alessandro Ghedini <ghedo@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 3555-1] imlib2 security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3555-1 security@...ian.org https://www.debian.org/security/ Alessandro Ghedini April 23, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : imlib2 CVE ID : CVE-2011-5326 CVE-2014-9771 CVE-2016-3993 CVE-2016-3994 CVE-2016-4024 Debian Bug : 639414 785369 819818 820206 821732 Several vulnerabilities were discovered in imlib2, an image manipulation library. CVE-2011-5326 Kevin Ryde discovered that attempting to draw a 2x1 radi ellipse results in a floating point exception. CVE-2014-9771 It was discovered that an integer overflow could lead to invalid memory reads and unreasonably large memory allocations. CVE-2016-3993 Yuriy M. Kaminskiy discovered that drawing using coordinates from an untrusted source could lead to an out-of-bound memory read, which in turn could result in an application crash. CVE-2016-3994 Jakub Wilk discovered that a malformed image could lead to an out-of-bound read in the GIF loader, which may result in an application crash or information leak. CVE-2016-4024 Yuriy M. Kaminskiy discovered an integer overflow that could lead to an insufficient heap allocation and out-of-bound memory write. For the oldstable distribution (wheezy), these problems have been fixed in version 1.4.5-1+deb7u2. For the stable distribution (jessie), these problems have been fixed in version 1.4.6-2+deb8u2. For the unstable distribution (sid), these problems have been fixed in version 1.4.8-1. We recommend that you upgrade your imlib2 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCgAGBQJXG/nbAAoJEK+lG9bN5XPLmygP/1YrypjqRVSwpNfiPHUbPuSg kFhMouzCPFztDKCDf5EQYnajZ7u74zyyRVtR4DBOjIOiXQR4PlT5bcyBCkEuO8zp HQQiRSWbErCJEnT93ryjOIE0Weql5kMWEXzN8Gucr8WLwOd8IK5mBfJ6ROnBnsuY 1YRxuRt/FScfER70irZcSZagQqcifWPnmNw7s4qXrRkxoAvmq+AM9EtXQEnvNvtE O2fUlD5RLHWnkNpxAu11dwbvkEOpDVBaYj21TDsYyb1OzUxt9DL5VgGr7Fli/5H4 BJE8G7jbVZQ5OaRD2vkXIrV1+6vczIFk+vrqxOqq8lwK/SNvpyjVIty1guPcX3TR pCk2v3hHBUg4bL2EEo2Qt6KsZNLvcFFWeSs8690Y2cXLh72AiIzZavwqUybIH2nd SljzD64QCM6uJHLnMwDxVum1h2ma1LUGp9Y6BMar09AwEG66H6N+7vUtuKmQBfDF c5L5fMwjC3Xe6ByQAK71gqzsfSdfAweztYm2n5n//fakhv6OINOAaIvQPv2KnTgA MzqOxc1If+HYgaVYnzkwBBpJWTu3oVqwQqkyq7D40Bf7SK5VN37m7jLsYCKIRC1M MA/u+QNFlAVbAq0o6ghlNFspcnF+JAdXOjiCrxK8xNwyXsKfJomIvhG1iDtYOMse XMipF2mhl3pe4KdFauUE =+2Hm -----END PGP SIGNATURE-----
Powered by blists - more mailing lists