Description
Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the
GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28
and 7.x before 7.0.13, allows remote attackers to cause a denial of service
(stack-based buffer overflow) or possibly have unspecified other impact via
a crafted imagecreatefromstring call.
Notes
mdeslaur | php uses the system libgd2
0019-Patch-for-security-bug-https-bugs.php.net-bug.php-id.patch
in Debian jessie update. |
Package
Upstream: | needs-triage
|
Ubuntu 14.04 ESM (Trusty Tahr): | not-affected
(uses system gd)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Updated: 2019-12-05 18:46:30 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)