{"id":"MGASA-2016-0421","summary":"Updated libgd packages fixe security vulnerabilities","details":"Ibrahim El-Sayed discovered that the GD library incorrectly handled\ncertain malformed Tiff images. If a user or automated system were\ntricked into processing a specially crafted Tiff image, an attacker\ncould cause a denial of service (CVE-2016-6911).\n\nEmmanuel Law discovered that the GD library incorrectly handled certain\nstrings when creating images. If a user or automated system were tricked\ninto processing a specially crafted image, an attacker could cause a\ndenial of service, or possibly execute arbitrary code (CVE-2016-8670).\n","modified":"2026-02-01T07:44:30.543670Z","published":"2016-12-22T21:41:01Z","related":["CVE-2016-6911","CVE-2016-8670"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0421.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=19594"},{"type":"REPORT","url":"http://www.ubuntu.com/usn/usn-3117-1"}],"affected":[{"package":{"name":"libgd","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/libgd?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.3-1.4.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0421.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}