libgd2: CVE-2016-9933: imagefilltoborder stackoverflow on truecolor images

Related Vulnerabilities: CVE-2016-9933  

Debian Bug report logs - #849038
libgd2: CVE-2016-9933: imagefilltoborder stackoverflow on truecolor images

version graph

Package: libgd2; Maintainer for libgd2 is GD Team <team+gd@tracker.debian.org>;

Reported by: Balint Reczey <balint@balintreczey.hu>

Date: Thu, 22 Dec 2016 02:33:02 UTC

Severity: serious

Tags: fixed-upstream, security, upstream

Found in versions 2.0.36~rc1~dfsg-6.1, 2.0.36~rc1~dfsg-6.1+deb7u2

Fixed in versions 2.2.3-87-gd0fec80-3, 2.2.2-29-g3c2b605-1, libgd2/2.1.0-5+deb8u8

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, GD team <pkg-gd-devel@lists.alioth.debian.org>:
Bug#849038; Package libgd2. (Thu, 22 Dec 2016 02:33:04 GMT) (full text, mbox, link).


Acknowledgement sent to Balint Reczey <balint@balintreczey.hu>:
New Bug report received and forwarded. Copy sent to GD team <pkg-gd-devel@lists.alioth.debian.org>. (Thu, 22 Dec 2016 02:33:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Balint Reczey <balint@balintreczey.hu>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: libgd2: CVE-2016-9933: imagefilltoborder stackoverflow on truecolor images
Date: Thu, 22 Dec 2016 03:31:03 +0100
Package: libgd2
Severity: serious
Tags: security

Hi,

the following vulnerability was published for libgd2.

CVE-2016-9933[0]:
imagefilltoborder stackoverflow on truecolor images

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9933
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
Please adjust the affected versions in the BTS as needed.




Marked as found in versions 2.0.36~rc1~dfsg-6.1+deb7u2. Request was from Bálint Réczey <balint@balintreczey.hu> to control@bugs.debian.org. (Thu, 22 Dec 2016 02:42:03 GMT) (full text, mbox, link).


Marked as fixed in versions 2.2.3-87-gd0fec80-3. Request was from Bálint Réczey <balint@balintreczey.hu> to control@bugs.debian.org. (Thu, 22 Dec 2016 02:42:04 GMT) (full text, mbox, link).


Marked as found in versions 2.0.36~rc1~dfsg-6.1. Request was from Bálint Réczey <balint@balintreczey.hu> to control@bugs.debian.org. (Thu, 22 Dec 2016 02:51:05 GMT) (full text, mbox, link).


Marked as fixed in versions 2.2.2-29-g3c2b605-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 22 Dec 2016 05:21:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, GD team <pkg-gd-devel@lists.alioth.debian.org>:
Bug#849038; Package libgd2. (Thu, 22 Dec 2016 13:39:03 GMT) (full text, mbox, link).


Acknowledgement sent to Ondřej Surý <ondrej@sury.org>:
Extra info received and forwarded to list. Copy sent to GD team <pkg-gd-devel@lists.alioth.debian.org>. (Thu, 22 Dec 2016 13:39:03 GMT) (full text, mbox, link).


Message #18 received at 849038@bugs.debian.org (full text, mbox, reply):

From: Ondřej Surý <ondrej@sury.org>
To: Balint Reczey <balint@balintreczey.hu>, 849038@bugs.debian.org, Debian Bug Tracking System <submit@bugs.debian.org>
Subject: Re: [pkg-GD-devel] Bug#849038: libgd2: CVE-2016-9933: imagefilltoborder stackoverflow on truecolor images
Date: Thu, 22 Dec 2016 14:36:28 +0100
Hi Balint,

thank you for the report. There's actually more security bugs pilled up,
and I am preparing GD 2.2.4 release to fix them all. Unfortunately (or
fortunately) not all security bugs are public, so it's hard to upload
fixes without exposing them.

I would like to have an update ready before end of the year.

Cheers,
-- 
Ondřej Surý <ondrej@sury.org>
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server
Knot Resolver (https://www.knot-resolver.cz/) – secure, privacy-aware,
fast DNS(SEC) resolver
Vše pro chleba (https://vseprochleba.cz) – Mouky ze mlýna a potřeby pro
pečení chleba všeho druhu

On Thu, Dec 22, 2016, at 03:31, Balint Reczey wrote:
> Package: libgd2
> Severity: serious
> Tags: security
> 
> Hi,
> 
> the following vulnerability was published for libgd2.
> 
> CVE-2016-9933[0]:
> imagefilltoborder stackoverflow on truecolor images
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2016-9933
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
> Please adjust the affected versions in the BTS as needed.
> 
> -- 
> pkg-GD-devel mailing list
> pkg-GD-devel@lists.alioth.debian.org
> http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-gd-devel



Added tag(s) fixed-upstream and upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 01 Jan 2017 16:12:02 GMT) (full text, mbox, link).


Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Mon, 02 Jan 2017 18:21:26 GMT) (full text, mbox, link).


Notification sent to Balint Reczey <balint@balintreczey.hu>:
Bug acknowledged by developer. (Mon, 02 Jan 2017 18:21:26 GMT) (full text, mbox, link).


Message #25 received at 849038-close@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 849038-close@bugs.debian.org
Subject: Bug#849038: fixed in libgd2 2.1.0-5+deb8u8
Date: Mon, 02 Jan 2017 18:17:09 +0000
Source: libgd2
Source-Version: 2.1.0-5+deb8u8

We believe that the bug you reported is fixed in the latest version of
libgd2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 849038@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated libgd2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 01 Jan 2017 17:18:01 +0100
Source: libgd2
Binary: libgd-tools libgd-dev libgd3 libgd-dbg libgd2-xpm-dev libgd2-noxpm-dev
Architecture: source
Version: 2.1.0-5+deb8u8
Distribution: jessie-security
Urgency: high
Maintainer: GD team <pkg-gd-devel@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 849038
Description: 
 libgd-dbg  - Debug symbols for GD Graphics Library
 libgd-dev  - GD Graphics Library (development version)
 libgd-tools - GD command line tools and example code
 libgd2-noxpm-dev - GD Graphics Library (transitional package)
 libgd2-xpm-dev - GD Graphics Library (transitional package)
 libgd3     - GD Graphics Library
Changes:
 libgd2 (2.1.0-5+deb8u8) jessie-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * CVE-2016-9933: gdImageFillToBorder stack-overflow when invalid color is
     used (Closes: #849038)
Checksums-Sha1: 
 8199f04ca4d038dc847ee9119171e91b53b8db35 2506 libgd2_2.1.0-5+deb8u8.dsc
 98e54c80f88572aed7ea4146249d5991dcf188c6 46360 libgd2_2.1.0-5+deb8u8.debian.tar.xz
Checksums-Sha256: 
 21156b41a28c1803d60408e7e671abdc8ee40c17eda68bd5189c0bf0c41b7288 2506 libgd2_2.1.0-5+deb8u8.dsc
 577300429012cdfcdd16528bbc14c7a3b90172f8b40cfb873ef50019bbf22638 46360 libgd2_2.1.0-5+deb8u8.debian.tar.xz
Files: 
 051f3c39007e8342995bcd3945e972bd 2506 graphics optional libgd2_2.1.0-5+deb8u8.dsc
 ef681ba90f9d18d1784ad446b236b71a 46360 graphics optional libgd2_2.1.0-5+deb8u8.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=kfhu
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 12 Feb 2017 07:29:43 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 14:41:59 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.