{"id":"MGASA-2016-0215","summary":"Updated libgd packages fix security vulnerabilities","details":"Updated libgd packages fix security vulnerabilities:\n\nThe gdImageScaleTwoPass function in gd_interpolation.c in libgd before 2.2.0\nuses inconsistent allocate and free approaches, which allows remote attackers\nto cause a denial of service (memory consumption) via a crafted call, as\ndemonstrated by a call to the PHP imagescale function (CVE-2015-8877).\n\nWhile creating an XBM image (imagexbm) with an user supplied name, libgd before\n2.2.0 did not check the vsnprintf return value, so an application might trust\nthis length and read more memory than it should, causing a read-out-of\nboundaries, leaking stack memory (CVE-2016-5116).\n","modified":"2026-04-16T06:24:06.385428894Z","published":"2016-06-02T21:40:03Z","upstream":["CVE-2015-8877","CVE-2016-5116"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0215.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18562"},{"type":"WEB","url":"https://www.debian.org/security/2016/dsa-3587"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2016/05/29/5"}],"affected":[{"package":{"name":"libgd","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/libgd?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.1-1.2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0215.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}