CVE-2016-10168

Priority
Medium
Description
Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before
2.2.4 allows remote attackers to have unspecified impact via vectors
involving the number of horizontal and vertical chunks in an image.
References
Notes
 mdeslaur> php uses the system libgd2
Assigned-to
mdeslaur
Package
Upstream:needed
Ubuntu 12.04 LTS (Precise Pangolin):released (2.0.36~rc1~dfsg-6ubuntu2.4)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.1.0-3ubuntu0.6)
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.1.1-4ubuntu0.16.04.6)
Ubuntu 16.10 (Yakkety Yak):released (2.2.1-1ubuntu3.3)
Ubuntu 17.04 (Zesty Zapus):not-affected (2.2.4-2)
Patches:
Upstream:https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6
Package
Source: php5 (LP Ubuntu Debian)
Upstream:released (5.6.30)
Ubuntu 12.04 LTS (Precise Pangolin):not-affected (uses system gd)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (uses system gd)
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 16.10 (Yakkety Yak):DNE
Ubuntu 17.04 (Zesty Zapus):DNE
Package
Upstream:released (7.1.1)
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 16.10 (Yakkety Yak):DNE
Ubuntu 17.04 (Zesty Zapus):not-affected (uses system gd)
Package
Upstream:released (7.0.15)
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (uses system gd)
Ubuntu 16.10 (Yakkety Yak):not-affected (uses system gd)
Ubuntu 17.04 (Zesty Zapus):not-affected (uses system gd)
More Information

Updated: 2017-03-22 18:14:54 UTC (commit 12284)