Bug 1388787 (CVE-2016-6911) - CVE-2016-6911 gd, php: Missing check for OOB read in dynamicGetbuf()
Summary: CVE-2016-6911 gd, php: Missing check for OOB read in dynamicGetbuf()
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2016-6911
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1388788 1388790
Blocks: 1388796
TreeView+ depends on / blocked
 
Reported: 2016-10-26 08:11 UTC by Adam Mariš
Modified: 2019-09-29 13:58 UTC (History)
19 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in gd. The function dynamicGetbuf() failed to check for out of bounds reads. An attacker could create a crafted image that would lead to a crash or, potentially, information disclosure.
Clone Of:
Environment:
Last Closed: 2016-12-16 04:30:55 UTC
Embargoed:


Attachments (Terms of Use)
CVE-2016-6911 patch (14.69 KB, patch)
2016-10-26 08:17 UTC, Adam Mariš
no flags Details | Diff

Description Adam Mariš 2016-10-26 08:11:09 UTC
It was found that dynamicGetbuf() doesn't check for out-of-bounds read and returns wrong return code.

Comment 1 Adam Mariš 2016-10-26 08:11:56 UTC
Created gd tracking bugs for this issue:

Affects: fedora-all [bug 1388788]

Comment 2 Adam Mariš 2016-10-26 08:12:07 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1388790]

Comment 3 Adam Mariš 2016-10-26 08:17:42 UTC
Created attachment 1214203 [details]
CVE-2016-6911 patch

Comment 4 Marek Skalický 2016-12-05 09:52:31 UTC
Why the patch is not published to upstream?
Who created the fix please?

Comment 5 Adam Mariš 2016-12-05 10:42:32 UTC
(In reply to Marek Skalický from comment #4)
> Why the patch is not published to upstream?
> Who created the fix please?

I took it from https://bugzilla.suse.com/show_bug.cgi?id=1005274#c0

Comment 6 Marek Skalický 2016-12-06 11:21:05 UTC
Pull request to upstream
https://github.com/libgd/libgd/pull/353


Note You need to log in before you can comment on or make changes to this bug.