blob: 5ec1e91b10e25da9d0f1881ea38cadaafca5d192 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="201006-16">
<title>GD: User-assisted execution of arbitrary code</title>
The GD library is prone to a buffer overflow vulnerability.
<product type="ebuild">gd</product>
<announced>June 03, 2010</announced>
<revised>June 03, 2010: 01</revised>
<package name="media-libs/gd" auto="yes" arch="*">
<unaffected range="ge">2.0.35-r1</unaffected>
<vulnerable range="lt">2.0.35-r1</vulnerable>
GD is a graphic library for fast image creation.
Tomas Hoger reported that the _gdGetColors() function in gd_gd.c does
not properly verify the colorsTotal struct member, possibly leading to
a buffer overflow.
<impact type="normal">
A remote attacker could entice a user to open a specially crafted image
file with a program using the GD library, possibly resulting in the
remote execution of arbitrary code with the privileges of the user
running the application, or a Denial of Service condition.
There is no known workaround at this time.
All GD users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gd-2.0.35-r1&quot;</code>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since November 21, 2009. It is likely that your system is
already no longer affected by this issue.
<uri link="">CVE-2009-3546</uri>
<metadata tag="requester" timestamp="Fri, 18 Dec 2009 02:08:27 +0000">
<metadata tag="submitter" timestamp="Mon, 31 May 2010 05:59:40 +0000">
<metadata tag="bugReady" timestamp="Mon, 31 May 2010 05:59:48 +0000">