[manjaro-security] [arch-security] [ASA-201605-1] imlib2: multiple issues

Levente Polyak anthraxx at archlinux.org
Wed May 4 02:07:41 CEST 2016


Arch Linux Security Advisory ASA-201605-1
=========================================

Severity: High
Date    : 2016-05-01
CVE-ID  : CVE-2011-5326 CVE-2016-3993 CVE-2016-3994 CVE-2016-4024
Package : imlib2
Type    : multiple issues
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package imlib2 before version 1.4.9-1 is vulnerable to multiple
issues that can lead to information leakage, application crash or
arbitrary code execution.

Resolution
==========

Upgrade to 1.4.9-1.

# pacman -Syu "imlib2>=1.4.9-1"

The problems have been fixed upstream in version 1.4.9.

Workaround
==========

None.

Description
===========

- CVE-2011-5326 (denial of service)

Kevin Ryde discovered that attempting to draw a 2x1 radi ellipse results
in a floating point exception.

- CVE-2016-3993 (information leakage)

Yuriy M. Kaminskiy discovered that drawing using coordinates from an
untrusted source could lead to an out-of-bound memory read, which in
turn could result in an application crash.

- CVE-2016-3994 (information Leakage)

Jakub Wilk discovered that a malformed image could lead to an
out-of-bound read in the GIF loader, which may result in an application
crash or information leak.

- CVE-2016-4024 (arbitrary code execution)

Yuriy M. Kaminskiy discovered an integer overflow that could lead to an
insufficient heap allocation and out-of-bound memory write.

Impact
======

An attacker can leverage vulnerable library calls in imlib2 to crash an
application, or read/write to the application's memory. This can lead to
potential information leak or modification of the application's flow.

References
==========

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4021
http://article.gmane.org/gmane.comp.window-managers.enlightenment.devel/64373
http://article.gmane.org/gmane.comp.security.oss.general/19276

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20160504/9bc21f8f/attachment.pgp>


More information about the manjaro-security mailing list