MGASA-2016-0339

Source
https://advisories.mageia.org/MGASA-2016-0339.html
Import Source
https://advisories.mageia.org/MGASA-2016-0339.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0339
Related
Published
2016-10-12T13:46:10Z
Modified
2016-10-12T13:38:22Z
Summary
The updated packages fix a security vulnerability
Details

Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls. (CVE-2016-7568)

References
Credits

Affected packages