{"id":"USN-3075-1","summary":"imlib2 vulnerabilities","details":"Jakub Wilk discovered an out of bounds read in the GIF loader\nimplementation in Imlib2. An attacker could use this to cause a\ndenial of service (application crash) or possibly obtain sensitive\ninformation. (CVE-2016-3994)\n\nYuriy M. Kaminskiy discovered an off-by-one error when handling\ncoordinates in Imlib2. An attacker could use this to cause a denial of\nservice (application crash). (CVE-2016-3993)\n\nYuriy M. Kaminskiy discovered that integer overflows existed in Imlib2\nwhen handling images with large dimensions. An attacker could use\nthis to cause a denial of service (memory exhaustion or application\ncrash). (CVE-2014-9771, CVE-2016-4024)\n\nKevin Ryde discovered that the ellipse drawing code in Imlib2 would\nattempt to divide by zero when drawing a 2x1 ellipse. An attacker\ncould use this to cause a denial of service (application crash).\n(CVE-2011-5326)\n\nIt was discovered that Imlib2 did not properly handled GIF images\nwithout colormaps. An attacker could use this to cause a denial of\nservice (application crash). This issue only affected Ubuntu 12.04 LTS\nand Ubuntu 14.04 LTS. (CVE-2014-9762)\n\nIt was discovered that Imlib2 did not properly handle some PNM images,\nleading to a division by zero. An attacker could use this to cause\na denial of service (application crash). This issue only affected\nUbuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-9763)\n\nIt was discovered that Imlib2 did not properly handle error conditions\nwhen loading some GIF images. An attacker could use this to cause\na denial of service (application crash). This issue only affected\nUbuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-9764)\n","modified":"2026-02-10T04:41:02Z","published":"2016-09-09T03:48:22Z","related":["UBUNTU-CVE-2011-5326","UBUNTU-CVE-2014-9762","UBUNTU-CVE-2014-9763","UBUNTU-CVE-2014-9764","UBUNTU-CVE-2014-9771","UBUNTU-CVE-2016-3993","UBUNTU-CVE-2016-3994","UBUNTU-CVE-2016-4024"],"upstream":["CVE-2011-5326","CVE-2014-9762","CVE-2014-9763","CVE-2014-9764","CVE-2014-9771","CVE-2016-3993","CVE-2016-3994","CVE-2016-4024","UBUNTU-CVE-2011-5326","UBUNTU-CVE-2014-9762","UBUNTU-CVE-2014-9763","UBUNTU-CVE-2014-9764","UBUNTU-CVE-2014-9771","UBUNTU-CVE-2016-3993","UBUNTU-CVE-2016-3994","UBUNTU-CVE-2016-4024"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3075-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2011-5326"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9762"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9763"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9764"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9771"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3993"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3994"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4024"}],"affected":[{"package":{"name":"imlib2","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/imlib2@1.4.6-2ubuntu0.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.6-2ubuntu0.1"}]}],"versions":["1.4.5-1ubuntu2","1.4.6-1","1.4.6-2"],"ecosystem_specific":{"binaries":[{"binary_name":"libimlib2","binary_version":"1.4.6-2ubuntu0.1"},{"binary_name":"libimlib2-dev","binary_version":"1.4.6-2ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3075-1.json","cves_map":{"cves":[{"id":"CVE-2011-5326","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2014-9762","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2014-9763","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2014-9764","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2014-9771","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-3993","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-3994","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4024","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"imlib2","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/imlib2@1.4.7-1ubuntu0.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.7-1ubuntu0.1"}]}],"versions":["1.4.7-1","1.4.7-1build1"],"ecosystem_specific":{"binaries":[{"binary_name":"libimlib2","binary_version":"1.4.7-1ubuntu0.1"},{"binary_name":"libimlib2-dev","binary_version":"1.4.7-1ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3075-1.json","cves_map":{"cves":[{"id":"CVE-2011-5326","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-3993","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-3994","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4024","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}