Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 592720 (CVE-2016-5766)

Summary: <media-libs/gd-2.2.3: Integer Overflow in _gd2GetHeader
Product: Gentoo Security Reporter: Thomas Deutschmann <whissi>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Severity: normal CC: graphics+disabled, vapier
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
See Also:
Whiteboard: A3 [glsa cve]
Package list:
Runtime testing required: ---
Bug Depends on: 587662    
Bug Blocks:    

Description Thomas Deutschmann gentoo-dev Security 2016-09-02 11:28:20 UTC
Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2016-12-04 11:09:01 UTC
This issue was resolved and addressed in
 GLSA 201612-09 at
by GLSA coordinator Aaron Bauman (b-man).