UbuntuUpdates.org

Package "libimlib2"

Name: libimlib2

Description:

image loading, rendering, saving library

Latest version: 1.4.7-1ubuntu0.1
Release: xenial (16.04)
Level: updates
Repository: universe
Head package: imlib2

Links


Download "libimlib2"


Other versions of "libimlib2" in Xenial

Repository Area Version
base universe 1.4.7-1build1
security universe 1.4.7-1ubuntu0.1

Changelog

Version: 1.4.7-1ubuntu0.1 2016-09-09 03:06:25 UTC

  imlib2 (1.4.7-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: denial of service (divide-by-zero) via drawing
    a 2x1 ellipse.
    - debian/patches/debian/patches/03_CVE-2011-5326.patch: ensure
      denominators are not zero.
    - CVE-2011-5326
  * SECURITY UPDATE: denial of service due to out-of-bounds read.
    - debian/patches/debian/patches/04_CVE-2016-3993.patch: check
      boundary condition before reading array element.
    - CVE-2016-3993
  * SECURITY UPDATE: out-of-bounds read handling GIFs leading to denial
    of service or information disclosure.
    - debian/patches/debian/patches/05_CVE-2016-3994.patch: ensure
      colormap limits are honored.
    - CVE-2016-3994
  * SECURITY UPDATE: different integer overflow on 32 bit arches
    leading to a denial of service
    - debian/patches/debian/patches/06_CVE-2016-4024.patch: reduce
      allowed dimensions even further.
    - CVE-2016-4024

 -- Steve Beattie <email address hidden> Thu, 01 Sep 2016 14:26:43 -0700

CVE-2011-5326 imlib2 before 1.4.9 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) by drawing a 2x1 ellipse.
CVE-2016-3993 Off-by-one error in the __imlib_MergeUpdate function in lib/updates.c in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (ou
CVE-2016-3994 The GIF loader in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (application crash) or obtain sensitive information via a
CVE-2016-4024 Integer overflow in imlib2 before 1.4.9 on 32-bit platforms allows remote attackers to execute arbitrary code via large dimensions in an image, which



About   -   Send Feedback to @ubuntu_updates