{"id":12760,"date":"2016-05-10T16:39:43","date_gmt":"2016-05-10T08:39:43","guid":{"rendered":"https:\/\/www.deepin.org\/?p=9826"},"modified":"2017-08-31T10:42:40","modified_gmt":"2017-08-31T02:42:40","slug":"security-updates%ef%bc%88dsa-3555-1-dsa-3556-1%ef%bc%89","status":"publish","type":"post","link":"https:\/\/www.deepin.org.cn\/en\/security-updates%ef%bc%88dsa-3555-1-dsa-3556-1%ef%bc%89\/","title":{"rendered":"Security Updates\uff08DSA-3555-1 &#038;DSA-3556-1\uff09"},"content":{"rendered":"<a href=\"https:\/\/www.deepin.org\/wp-content\/uploads\/en30.jpg\"><img loading=\"lazy\" class=\"aligncenter wp-image-9827\" src=\"https:\/\/www.deepin.org\/wp-content\/uploads\/en30.jpg\" alt=\"en\" width=\"749\" height=\"321\" \/><\/a><\/p>\n<p>The security updates of\u00a0imlib2 and libgd2.<\/p>\n<p>&nbsp;<\/p>\n<h2><b>Vulnerability Information<\/b><\/h2>\n<p><b>DSA-3555-1 imlib2 --Security Updates<\/b><\/p>\n<p>Security database details:<\/p>\n<ul>\n<li><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2011-5326\" target=\"_blank\" rel=\"nofollow\">CVE-2011-5326<\/a>\u00a0:\u00a0Kevin Ryde discovered that attempting to draw a 2x1 radi ellipse results in a floating point exception.<\/li>\n<li><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2014-9771\" target=\"_blank\" rel=\"nofollow\">CVE-2014-9771<\/a>:\u00a0It was discovered that an integer overflow could lead to invalid memory reads and unreasonably large memory allocations.<\/li>\n<li><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2016-3993\" target=\"_blank\" rel=\"nofollow\">CVE-2016-3993<\/a>:\u00a0Yuriy M. Kaminskiy discovered that drawing using coordinates from an untrusted source could lead to an out-of-bound memory read, which in turn could result in an application crash.<\/li>\n<li><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2016-3994\" target=\"_blank\" rel=\"nofollow\">CVE-2016-3994<\/a>:\u00a0Jakub Wilk discovered that a malformed image could lead to an out-of-bound read in the GIF loader, which may result in an application crash or information leak.<\/li>\n<li><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2016-4024\" target=\"_blank\" rel=\"nofollow\">CVE-2016-4024<\/a>:\u00a0Yuriy M. Kaminskiy discovered an integer overflow that could lead to an insufficient heap allocation and out-of-bound memory write.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><b>DSA-3556-1 libgd2 --Security Updates<\/b><\/p>\n<p>Security database details:<\/p>\n<ul>\n<li><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2016-3074\" target=\"_blank\">CVE-2016-3074<\/a>\uff1aHans Jerry Illikainen discovered that libgd2, a library for programmatic graphics creation and manipulation, suffers of a signedness vulnerability which may result in a heap overflow when processing specially crafted compressed gd2 data. A remote attacker can take advantage of this flaw to cause an application using the libgd2 library to crash, or potentially, to execute arbitrary code with the privileges of the user running the application.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><b>Fixing Status<\/b><\/p>\n<p>imlib2 security vulnerabilities have been fixed in\u00a0version 1.4.8-1; libgd2 security vulnerabilities have been fixed in version\u00a02.1.1-4.1.<\/p>\n<p>We recommend that you upgrade the system to obtain the patches to fix the vulnerabilities.","protected":false},"excerpt":{"rendered":"<p>The security updates of\u00a0imlib2 and libgd2. &nbsp; Vulnerability Information DSA-3555-1 imlib2 --Security Updates Security database details: CVE-2011-5326\u00a0:\u00a0Kevin Ryde discovered that attempting to draw a 2x1 radi ellipse results in a floating point exception. CVE-2014-9771:\u00a0It was discovered that an integer overflow could lead to invalid memory reads and unreasonably large memory allocations. CVE-2016-3993:\u00a0Yuriy M. Kaminskiy discovered that drawing using coordinates from an untrusted source could lead to an out-of-bound memory read, which in turn could result in an application crash. CVE-2016-3994:\u00a0Jakub Wilk discovered that a malformed image could lead to an out-of-bound read in the GIF loader, which may result in ...<a href=https:\/\/www.deepin.org.cn\/en\/security-updates%ef%bc%88dsa-3555-1-dsa-3556-1%ef%bc%89\/>Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":12765,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[75],"tags":[],"_links":{"self":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/12760"}],"collection":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/comments?post=12760"}],"version-history":[{"count":11,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/12760\/revisions"}],"predecessor-version":[{"id":25289,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/12760\/revisions\/25289"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/media?parent=12760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/categories?post=12760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/tags?post=12760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}