MGASA-2017-0086

Source
https://advisories.mageia.org/MGASA-2017-0086.html
Import Source
https://advisories.mageia.org/MGASA-2017-0086.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0086
Related
Published
2017-03-25T16:56:41Z
Modified
2017-03-25T16:45:31Z
Summary
Updated libwmf packages fix security vulnerability
Details

The gdImageCreate function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (system hang) via an oversized image. (CVE-2016-9317)

The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file. (CVE-2016-10167)

Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image. (CVE-2016-10168)

References
Credits

Affected packages

Mageia:5 / libwmf

Package

Name
libwmf
Purl
pkg:rpm/mageia/libwmf?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.8.4-32.4.mga5

Ecosystem specific

{
    "section": "core"
}