Ubuntu Security Notification for Imlib2 Vulnerabilities (USN-3075-1)

漏洞类别:Ubuntu

漏洞等级:

漏洞信息

An out of bounds read in the GIF loader implementation in Imlib2.

An off-by-one error when handling coordinates in Imlib2.

It was discovered that integer overflows existed in Imlib2 when handling images with large dimensions.

It was discovered that the ellipse drawing code in Imlib2 would attempt to divide by zero when drawing a 2×1 ellipse.

It was discovered that Imlib2 did not properly handled GIF images without colormaps.

It was discovered that Imlib2 did not properly handle some PNM images, leading to a division by zero.

It was discovered that Imlib2 did not properly handle error conditions when loading some GIF images.

漏洞危害

An attacker could use this to cause a denial of service (application crash) or possibly obtain sensitive information. (CVE-2016-3994)

An attacker could use this to cause a denial of service (application crash). (CVE-2016-3993)

An attacker could use this to cause a denial of service (memory exhaustion or application crash). (CVE-2014-9771, CVE-2016-4024)

An attacker could use this to cause a denial of service (application crash). (CVE-2011-5326)

An attacker could use this to cause a denial of service (application crash). This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-9762)

An attacker could use this to cause a denial of service (application crash). This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-9763)

An attacker could use this to cause a denial of service (application crash). This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-9764)

解决方案

Refer to Ubuntu advisory USN-3075-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3075-1: 12.04 (Precise) on src (libimlib2)

USN-3075-1: 16.04 (Xenial) on src (libimlib2)

USN-3075-1: 14.04 (Kylin) on src (libimlib2)

0day

发表评论