imlib2: CVE-2014-9771: exploitable integer overflow in _imlib_SaveImage

Related Vulnerabilities: CVE-2014-9771   CVE-2011-5326   CVE-2016-3993   CVE-2016-3994   CVE-2016-4024  

Debian Bug report logs - #820206
imlib2: CVE-2014-9771: exploitable integer overflow in _imlib_SaveImage

version graph

Reported by: "Yuriy M. Kaminskiy" <yumkam@gmail.com>

Date: Wed, 6 Apr 2016 15:09:09 UTC

Severity: important

Tags: fixed-upstream, jessie, patch, security, upstream

Found in versions imlib2/1.4.6-2, imlib2/1.4.6-2+deb8u1, imlib2/1.4.5-1

Fixed in versions imlib2/1.4.7-1, imlib2/1.4.6-2+deb8u2, imlib2/1.4.5-1+deb7u2

Done: Alessandro Ghedini <ghedo@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Alessandro Ghedini <ghedo@debian.org>:
Bug#820206; Package src:imlib2. (Wed, 06 Apr 2016 15:09:14 GMT) (full text, mbox, link).


Acknowledgement sent to "Yuriy M. Kaminskiy" <yumkam@gmail.com>:
New Bug report received and forwarded. Copy sent to Alessandro Ghedini <ghedo@debian.org>. (Wed, 06 Apr 2016 15:09:14 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: "Yuriy M. Kaminskiy" <yumkam@gmail.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: imlib2: potentially exploitable integer overflows
Date: Wed, 6 Apr 2016 18:07:36 +0300
[Message part 1 (text/plain, inline)]
Source: imlib2
Version: 1.4.6-2+deb8u1
Severity: important
Tags: security jessie upstream fixed-upstream patch

Dear Maintainer,

imlib2 commit v1.4.6-19-g143f299 fixes potentially exploitable
integer overflow.

https://git.enlightenment.org/legacy/imlib2.git/commit/?id=143f299

Please apply this patch to jessie (it is already in 1.4.7 in stretch/sid).

-- System Information:
Debian Release: 8.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable'), (100, 
'proposed-updates')
Architecture: i386 (x86_64)
Foreign Architectures: amd64

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=ru_RU.KOI8-R, LC_CTYPE=ru_RU.KOI8-R (charmap=KOI8-R)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

[0001-Make-IMAGE_DIMENSIONS_OK-more-restrictive.patch (text/x-diff, attachment)]

Marked as found in versions imlib2/1.4.6-2. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 07 Apr 2016 20:09:11 GMT) (full text, mbox, link).


Marked as fixed in versions imlib2/1.4.7-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 07 Apr 2016 20:09:12 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Alessandro Ghedini <ghedo@debian.org>:
Bug#820206; Package src:imlib2. (Sun, 10 Apr 2016 16:48:05 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Alessandro Ghedini <ghedo@debian.org>. (Sun, 10 Apr 2016 16:48:05 GMT) (full text, mbox, link).


Message #14 received at 820206@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: "Yuriy M. Kaminskiy" <yumkam@gmail.com>, 820206@bugs.debian.org
Subject: Re: Bug#820206: imlib2: potentially exploitable integer overflows
Date: Sun, 10 Apr 2016 18:44:19 +0200
Control: retitle -1 imlib2: CVE-2014-9771: exploitable integer overflow in _imlib_SaveImage

Hi,

On Wed, Apr 06, 2016 at 06:07:36PM +0300, Yuriy M. Kaminskiy wrote:
> Source: imlib2
> Version: 1.4.6-2+deb8u1
> Severity: important
> Tags: security jessie upstream fixed-upstream patch
> 
> Dear Maintainer,
> 
> imlib2 commit v1.4.6-19-g143f299 fixes potentially exploitable
> integer overflow.
> 
> https://git.enlightenment.org/legacy/imlib2.git/commit/?id=143f299
> 
> Please apply this patch to jessie (it is already in 1.4.7 in stretch/sid).

CVE-2014-9771 has been assigned for this issue.

Regards,
Salvatore



Changed Bug title to 'imlib2: CVE-2014-9771: exploitable integer overflow in _imlib_SaveImage' from 'imlib2: potentially exploitable integer overflows'. Request was from Salvatore Bonaccorso <carnil@debian.org> to 820206-submit@bugs.debian.org. (Sun, 10 Apr 2016 16:48:05 GMT) (full text, mbox, link).


Marked as found in versions imlib2/1.4.5-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 10 Apr 2016 17:03:09 GMT) (full text, mbox, link).


Reply sent to Alessandro Ghedini <ghedo@debian.org>:
You have taken responsibility. (Sun, 24 Apr 2016 16:21:20 GMT) (full text, mbox, link).


Notification sent to "Yuriy M. Kaminskiy" <yumkam@gmail.com>:
Bug acknowledged by developer. (Sun, 24 Apr 2016 16:21:20 GMT) (full text, mbox, link).


Message #23 received at 820206-close@bugs.debian.org (full text, mbox, reply):

From: Alessandro Ghedini <ghedo@debian.org>
To: 820206-close@bugs.debian.org
Subject: Bug#820206: fixed in imlib2 1.4.6-2+deb8u2
Date: Sun, 24 Apr 2016 16:17:08 +0000
Source: imlib2
Source-Version: 1.4.6-2+deb8u2

We believe that the bug you reported is fixed in the latest version of
imlib2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 820206@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alessandro Ghedini <ghedo@debian.org> (supplier of updated imlib2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 23 Apr 2016 17:21:25 +0100
Source: imlib2
Binary: libimlib2 libimlib2-dev
Architecture: source amd64
Version: 1.4.6-2+deb8u2
Distribution: jessie-security
Urgency: high
Maintainer: Alessandro Ghedini <ghedo@debian.org>
Changed-By: Alessandro Ghedini <ghedo@debian.org>
Description:
 libimlib2  - image loading, rendering, saving library
 libimlib2-dev - image loading, rendering, saving library (development files)
Closes: 639414 785369 819818 820206 821732
Changes:
 imlib2 (1.4.6-2+deb8u2) jessie-security; urgency=high
 .
   * Fix divide-by-zero on 2x1 ellipse as per CVE-2011-5326 (Closes: #639414)
   * Fix integer overflow as per CVE-2014-9771 (Closes: #820206)
   * Fix off-by-one OOB read as per CVE-2016-3993 (Closes: #819818)
   * Fix out-of-bounds read in the GIF loader as per CVE-2016-3994
     (Closes: #785369)
   * Fix integer overflow as per CVE-2016-4024 (Closes: #821732)
Checksums-Sha1:
 7470354709a3d7be00b7167dfceb804ee46333ce 2024 imlib2_1.4.6-2+deb8u2.dsc
 a2482f66d66769fa36e6f3de7ec59c457ae67300 13808 imlib2_1.4.6-2+deb8u2.debian.tar.xz
 f99d69589a9dea8edabd3f1f3723d4738bbda80e 178094 libimlib2_1.4.6-2+deb8u2_amd64.deb
 581a0354099e5031d0f605459bb5b41402770557 171020 libimlib2-dev_1.4.6-2+deb8u2_amd64.deb
Checksums-Sha256:
 d912082e80c1e5e01e1a8133f798177fd6dcd97b29cfa66b1fc3a4b7707b367e 2024 imlib2_1.4.6-2+deb8u2.dsc
 14cf3fc71964d3d2399abc8166b775e2d150d3c4102f736270a4c528a19480a3 13808 imlib2_1.4.6-2+deb8u2.debian.tar.xz
 744136e9b44f76e61cf3aad4135da0368cb386fe4c022c720e82d414726b4f8a 178094 libimlib2_1.4.6-2+deb8u2_amd64.deb
 0b852d7b22748a0b53d510272d1037f556b65a1f19fb5baeb7da376637c38b5e 171020 libimlib2-dev_1.4.6-2+deb8u2_amd64.deb
Files:
 5a98c6da18fe01d668d49074147df1f7 2024 libs optional imlib2_1.4.6-2+deb8u2.dsc
 82a1d5e1d4827ab64b15ad1b38f20aab 13808 libs optional imlib2_1.4.6-2+deb8u2.debian.tar.xz
 d435a22396557ca7ae311f15103ea71d 178094 libs optional libimlib2_1.4.6-2+deb8u2_amd64.deb
 4dcaa20ec5088cbbc8bd0c0045109b7f 171020 libdevel optional libimlib2-dev_1.4.6-2+deb8u2_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=HD8L
-----END PGP SIGNATURE-----




Reply sent to Alessandro Ghedini <ghedo@debian.org>:
You have taken responsibility. (Mon, 25 Apr 2016 22:21:30 GMT) (full text, mbox, link).


Notification sent to "Yuriy M. Kaminskiy" <yumkam@gmail.com>:
Bug acknowledged by developer. (Mon, 25 Apr 2016 22:21:30 GMT) (full text, mbox, link).


Message #28 received at 820206-close@bugs.debian.org (full text, mbox, reply):

From: Alessandro Ghedini <ghedo@debian.org>
To: 820206-close@bugs.debian.org
Subject: Bug#820206: fixed in imlib2 1.4.5-1+deb7u2
Date: Mon, 25 Apr 2016 22:19:34 +0000
Source: imlib2
Source-Version: 1.4.5-1+deb7u2

We believe that the bug you reported is fixed in the latest version of
imlib2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 820206@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alessandro Ghedini <ghedo@debian.org> (supplier of updated imlib2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 23 Apr 2016 17:45:34 +0100
Source: imlib2
Binary: libimlib2 libimlib2-dev
Architecture: source amd64
Version: 1.4.5-1+deb7u2
Distribution: wheezy-security
Urgency: high
Maintainer: Laurence J. Lane <ljlane@debian.org>
Changed-By: Alessandro Ghedini <ghedo@debian.org>
Description: 
 libimlib2  - powerful image loading and rendering library
 libimlib2-dev - Imlib2 development files
Closes: 639414 785369 819818 820206 821732
Changes: 
 imlib2 (1.4.5-1+deb7u2) wheezy-security; urgency=high
 .
   * Fix divide-by-zero on 2x1 ellipse as per CVE-2011-5326 (Closes: #639414)
   * Fix integer overflow as per CVE-2014-9771 (Closes: #820206)
   * Fix off-by-one OOB read as per CVE-2016-3993 (Closes: #819818)
   * Fix out-of-bounds read in the GIF loader as per CVE-2016-3994
     (Closes: #785369)
   * Fix integer overflow as per CVE-2016-4024 (Closes: #821732)
Checksums-Sha1: 
 cad4c183388f29468d5c49fe1c814398fef0522a 1905 imlib2_1.4.5-1+deb7u2.dsc
 e425aecfda30d1560c6f3d4ae54b219d1e2308ad 13141 imlib2_1.4.5-1+deb7u2.debian.tar.gz
 87075df86ab13c6110a76e7352c467218e09e3d5 258882 libimlib2_1.4.5-1+deb7u2_amd64.deb
 04c7f1cdb10162a479d4a5b7f8ddb76ec20c921c 253156 libimlib2-dev_1.4.5-1+deb7u2_amd64.deb
Checksums-Sha256: 
 5ec1bcaa808ef24b09e5a8bf68ad4fbf336b078c9dfc019b49c6ce619a0bd74a 1905 imlib2_1.4.5-1+deb7u2.dsc
 a9bb6851b54b6c295718f44c9a16f0b7a6b1291c9fc6bc2b2f97454ff14d21c4 13141 imlib2_1.4.5-1+deb7u2.debian.tar.gz
 5719f093cdd785903c349b1dd129705a7accff210fd842da548d265c9c9ca66f 258882 libimlib2_1.4.5-1+deb7u2_amd64.deb
 a483fb6c50178dff14fe5be8bbbb69d69cc0d997c8ad1a03871d997ccc0e0316 253156 libimlib2-dev_1.4.5-1+deb7u2_amd64.deb
Files: 
 8068c0cdaac9bc87c1932d4a6cbc5621 1905 libs optional imlib2_1.4.5-1+deb7u2.dsc
 4aff721f0fbc1addbe68949812566e85 13141 libs optional imlib2_1.4.5-1+deb7u2.debian.tar.gz
 0b507f3301d223dd0f17328981c385e7 258882 libs optional libimlib2_1.4.5-1+deb7u2_amd64.deb
 667e42ae4ce9b18cd88a3bff421ef96f 253156 libdevel optional libimlib2-dev_1.4.5-1+deb7u2_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=fXu6
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 03 Jul 2016 07:27:41 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:06:41 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.