Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 592722 (CVE-2016-6207) - <media-libs/gd-2.2.3: Integer overflow error within _gdContributionsAlloc()
Summary: <media-libs/gd-2.2.3: Integer overflow error within _gdContributionsAlloc()
Status: RESOLVED FIXED
Alias: CVE-2016-6207
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://seclists.org/bugtraq/2016/Aug/35
Whiteboard: A3 [glsa cve]
Keywords:
Depends on: CVE-2016-6128
Blocks:
  Show dependency tree
 
Reported: 2016-09-02 11:35 UTC by Thomas Deutschmann (RETIRED)
Modified: 2016-12-04 11:09 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Deutschmann (RETIRED) gentoo-dev 2016-09-02 11:35:12 UTC
Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2016-12-04 11:09:08 UTC
This issue was resolved and addressed in
 GLSA 201612-09 at https://security.gentoo.org/glsa/201612-09
by GLSA coordinator Aaron Bauman (b-man).