Description
Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD
Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11,
allows remote attackers to cause a denial of service (heap-based buffer
overflow) or possibly have unspecified other impact via crafted imagewebp
and imagedestroy calls.
Notes
mdeslaur | php uses the system libgd2
code in gd 2.1.x is different, can use the php5 patch |
Package
Upstream: | needs-triage
|
Ubuntu 16.04 ESM: | released
(2.1.1-4ubuntu0.16.04.5)
|
Ubuntu 14.04 ESM: | released
(2.1.0-3ubuntu0.5)
|
Patches:
Package
Upstream: | needs-triage
|
Ubuntu 14.04 ESM: | not-affected
(uses system gd)
|
Patches:
Package
Upstream: | needs-triage
|
Ubuntu 16.04 ESM: | not-affected
(uses system gd)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 12:33:42 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)