gd
Page content
- Author: voroskoi
- Vulnerable: 2.0.34-1
- Unaffected: 2.0.34-2terminus1
Xavier Roche has reported a vulnerability in GD Graphics Library, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to the incorrect use of libpng within the function “gdPngReadData()” when processing truncated data. This can be exploited to cause an infinite loop by e.g. tricking an application using the library to process a specially crafted file.
- Bug Tracker URL: http://bugs.frugalware.org/task/2074