[pkg-GD-devel] Bug#839659: libgd2: CVE-2016-7568: Integer overflow in gdImageWebpCtx

Salvatore Bonaccorso carnil at debian.org
Mon Oct 3 15:22:30 UTC 2016

Source: libgd2
Version: 2.2.3-3
Severity: grave
Tags: security patch upstream fixed-upstream
Justification: user security hole
Forwarded: https://github.com/libgd/libgd/issues/308


the following vulnerability was published for libgd2.

| Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD
| Graphics Library (aka libgd) through 2.2.3, as used in PHP through
| 7.0.11, allows remote attackers to cause a denial of service
| (heap-based buffer overflow) or possibly have unspecified other impact
| via crafted imagewebp and imagedestroy calls.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-7568
[1] https://github.com/libgd/libgd/issues/308
[2] https://github.com/libgd/libgd/commit/40bec0f38f50e8510f5bb71a82f516d46facde03

Please adjust the affected versions in the BTS as needed.


More information about the pkg-GD-devel mailing list