Debian: DSA-3751-1: libgd2 security update
Debian: DSA-3751-1: libgd2 security update
A stack overflow vulnerability was discovered within the gdImageFillToBorder function in libgd2, a library for programmatic graphics creation and manipulation, triggered when invalid colors are used with truecolor images. A remote attacker can take advantage of this
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3751-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Salvatore Bonaccorso January 01, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libgd2 CVE ID : CVE-2016-9933 Debian Bug : 849038 A stack overflow vulnerability was discovered within the gdImageFillToBorder function in libgd2, a library for programmatic graphics creation and manipulation, triggered when invalid colors are used with truecolor images. A remote attacker can take advantage of this flaw to cause a denial-of-service against an application using the libgd2 library. For the stable distribution (jessie), this problem has been fixed in version 2.1.0-5+deb8u8. For the testing distribution (stretch), this problem has been fixed in version 2.2.2-29-g3c2b605-1. For the unstable distribution (sid), this problem has been fixed in version 2.2.2-29-g3c2b605-1. We recommend that you upgrade your libgd2 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.