Upstream information

CVE-2007-2756 at MITRE


The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entries: 276525 [RESOLVED / FIXED], 282730 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP3
  • gd >= 2.0.36.RC1-52.18
SUSE Linux Enterprise Server 11 SP4
  • gd >= 2.0.36.RC1-52.20.1
SUSE Linux Enterprise Software Development Kit 11 SP4
  • gd-devel >= 2.0.36.RC1-52.20.1
openSUSE Tumbleweed
  • gd >= 2.3.3-1.1
  • gd-devel >= 2.3.3-1.1
  • gd-devel-32bit >= 2.3.3-1.1
  • libgd3 >= 2.3.3-1.1
  • libgd3-32bit >= 2.3.3-1.1
openSUSE Tumbleweed GA gd-2.3.3-1.1