[pkg-GD-devel] Bug#839659: libgd2: CVE-2016-7568: Integer overflow in gdImageWebpCtx
carnil at debian.org
Mon Oct 3 15:22:30 UTC 2016
Tags: security patch upstream fixed-upstream
Justification: user security hole
the following vulnerability was published for libgd2.
| Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD
| Graphics Library (aka libgd) through 2.2.3, as used in PHP through
| 7.0.11, allows remote attackers to cause a denial of service
| (heap-based buffer overflow) or possibly have unspecified other impact
| via crafted imagewebp and imagedestroy calls.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
Please adjust the affected versions in the BTS as needed.
More information about the pkg-GD-devel