Debian Security Advisory
DLA-563-1 libgd2 -- LTS security update
- Date Reported:
- 26 Jul 2016
- Affected Packages:
- libgd2
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2016-6161.
- More information:
-
A global out of bounds read when encoding gif from malformed input was found in this software.
When given invalid inputs, we might be fed the EOF marker before it is actually the EOF. The gif logic assumes once it sees the EOF marker, there won't be any more data, so it leaves the cur_bits index possibly negative. So when we get more data, we underflow the masks array.
For Debian 7
Wheezy
, these problems have been fixed in version 2.0.36~rc1~dfsg-6.1+deb7u5.We recommend that you upgrade your libgd2 packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS