CVE-2016-4024

NameCVE-2016-4024
DescriptionInteger overflow in imlib2 before 1.4.9 on 32-bit platforms allows remote attackers to execute arbitrary code via large dimensions in an image, which triggers an out-of-bounds heap memory write operation.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3555-1
Debian Bugs821732

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
imlib2 (PTS)buster1.5.1-1fixed
bullseye1.7.1-2fixed
bookworm1.10.0-4+deb12u1fixed
trixie1.12.1-1fixed
sid1.12.1-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
imlib2sourcewheezy1.4.5-1+deb7u2DSA-3555-1
imlib2sourcejessie1.4.6-2+deb8u2DSA-3555-1
imlib2source(unstable)1.4.8-1821732

Notes

Upstream fix: https://git.enlightenment.org/legacy/imlib2.git/commit/?id=7eba2e4c8ac0e20838947f10f29d0efe1add8227
https://www.openwall.com/lists/oss-security/2016/04/14/5

Search for package or bug name: Reporting problems