Debian Security Advisory

DLA-758-1 libgd2 -- LTS security update

Date Reported:
22 Dec 2016
Affected Packages:
libgd2
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 849038.
In Mitre's CVE dictionary: CVE-2016-9933.
More information:

It was discovered that invalid color causes stack exhaustion by recursive call to function gdImageFillToBorder when the image used is truecolor.

The vulnerability can be exploited through php5 which uses system's libgd2 library through the imagefilltoborder() PHP function to cause denial of service (stack overflow) and possibly have unspecified other impact.

For Debian 7 Wheezy, these problems have been fixed in version 2.0.36~rc1~dfsg-6.1+deb7u7.

We recommend that you upgrade your libgd2 packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS