CVE-2016-8670

Priority
Description
Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the
GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28
and 7.x before 7.0.13, allows remote attackers to cause a denial of service
(stack-based buffer overflow) or possibly have unspecified other impact via
a crafted imagecreatefromstring call.
Notes
 mdeslaur> php uses the system libgd2
 mdeslaur> 0019-Patch-for-security-bug-https-bugs.php.net-bug.php-id.patch
 mdeslaur> in Debian jessie update.
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 14.04 LTS (Trusty Tahr):released (2.1.0-3ubuntu0.5)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.1.1-4ubuntu0.16.04.5)
Patches:
Upstream:https://github.com/libgd/libgd/commit/53110871935244816bbb9d131da0bccff734bfe9
Package
Source: php5 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (uses system gd)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:needs-triage
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (uses system gd)
More Information

Updated: 2018-10-31 21:24:42 UTC (commit cfa7cf69d76449ccff972ac22f40976a08d908c2)