Summary: | <media-libs/gd-2.2.2: signedness vulnerability (CVE-2016-3074) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | graphics+disabled, php-bugs, vapier |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2016/04/21/6 | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=581834 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2016-05-03 09:01:26 UTC
i need to roll a new release upstream. there was concern about making sure php also had the fix, but i haven't looked there ... i'm not that familiar with their vcs and where their copy of gd is kept. (In reply to SpanKY from comment #1) > i need to roll a new release upstream. there was concern about making sure > php also had the fix, but i haven't looked there ... i'm not that familiar > with their vcs and where their copy of gd is kept. PHP has this CVE covered in the latest releases. See bug 581834 i've added 2.2.0 to the tree now. give it a few days and then stabilize. CVE-2016-3074 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074): Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow. (In reply to SpanKY from comment #3) > i've added 2.2.0 to the tree now. give it a few days and then stabilize. 2.2.0 is no longer in the tree. 2.2.1 has been there for over 30 days. Would you like to target 2.2.1, the more recent 2.2.2, or hold off on stabilization? 2.2.1 would solve the security issue at this point. Thanks. Added to existing GLSA request. (In reply to Aaron Bauman from comment #5) considering 2.2.2 fixes more security issues, prob want to straight to that @arches, please stabilize the following: =media-libs/gd-2.2.2 Stable on alpha. amd64 stable x86 stable Stable for HPPA PPC64. arm stable ppc stable sparc stable ia64 stable Removing unstable arches from CC. @maintainer(s), please cleanup the vulnerable versions. This issue was resolved and addressed in GLSA 201607-04 at https://security.gentoo.org/glsa/201607-04 by GLSA coordinator Aaron Bauman (b-man). @maintainer(s), please cleanup the vulnerable versions. The vulnerable versions of media-libs/gd have been removed, so this can proceed. tree is clean |