CVE-2016-10168

Priority
Medium
Description
Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before
2.2.4 allows remote attackers to have unspecified impact via vectors
involving the number of horizontal and vertical chunks in an image.
References
Notes
 mdeslaur> php uses the system libgd2
Assigned-to
mdeslaur
Package
Upstream:needed
Ubuntu 14.04 LTS (Trusty Tahr):released (2.1.0-3ubuntu0.6)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.1.1-4ubuntu0.16.04.6)
Ubuntu 17.04 (Zesty Zapus):not-affected (2.2.4-2)
Patches:
Upstream:https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6
Package
Source: php5 (LP Ubuntu Debian)
Upstream:released (5.6.30)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (uses system gd)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.04 (Zesty Zapus):DNE
Package
Upstream:released (7.1.1)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.04 (Zesty Zapus):not-affected (uses system gd)
Package
Upstream:released (7.0.15)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (uses system gd)
Ubuntu 17.04 (Zesty Zapus):not-affected (uses system gd)
More Information

Updated: 2017-08-11 23:54:19 UTC (commit 13081)