First published: Wed Apr 06 2016(Updated: )
An integer overflow vulnerability was found in imlib2. Upstream fix: <a href="https://git.enlightenment.org/legacy/imlib2.git/commit/?id=143f299">https://git.enlightenment.org/legacy/imlib2.git/commit/?id=143f299</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/imlib2 | <=1.4.6-2<=1.4.6-2+deb8u1<=1.4.5-1 | 1.4.7-1 1.4.6-2+deb8u2 1.4.5-1+deb7u2 |
debian/imlib2 | 1.7.1-2+deb11u1 1.10.0-4+deb12u1 1.12.1-1.1 | |
redhat/imlib2 | <1.4.7 | 1.4.7 |
Enlightenment Imlib2 | <=1.4.6 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9771 has a severity rating that can lead to denial of service due to integer overflow in imlib2.
To fix CVE-2014-9771, upgrade imlib2 to version 1.4.7 or later.
CVE-2014-9771 affects imlib2 versions prior to 1.4.7, specifically 1.4.6 and earlier.
There is no specific workaround recommended for CVE-2014-9771 aside from upgrading to a patched version.
CVE-2014-9771 is classified as an integer overflow vulnerability.