[Secure-testing-team] Bug#839659: libgd2: CVE-2016-7568: Integer overflow in gdImageWebpCtx
Salvatore Bonaccorso
carnil at debian.org
Mon Oct 3 15:22:30 UTC 2016
Source: libgd2
Version: 2.2.3-3
Severity: grave
Tags: security patch upstream fixed-upstream
Justification: user security hole
Forwarded: https://github.com/libgd/libgd/issues/308
Hi,
the following vulnerability was published for libgd2.
CVE-2016-7568[0]:
| Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD
| Graphics Library (aka libgd) through 2.2.3, as used in PHP through
| 7.0.11, allows remote attackers to cause a denial of service
| (heap-based buffer overflow) or possibly have unspecified other impact
| via crafted imagewebp and imagedestroy calls.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2016-7568
[1] https://github.com/libgd/libgd/issues/308
[2] https://github.com/libgd/libgd/commit/40bec0f38f50e8510f5bb71a82f516d46facde03
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
More information about the Secure-testing-team
mailing list