DEBIAN-CVE-2016-8670

Source
https://security-tracker.debian.org/tracker/CVE-2016-8670
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2016-8670.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2016-8670
Upstream
Published
2017-01-04T20:59:00Z
Modified
2025-09-30T03:54:25Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Integer signedness error in the dynamicGetbuf function in gdiodp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.

References

Affected packages

Debian:11 / libgd2

Package

Name
libgd2
Purl
pkg:deb/debian/libgd2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3-87-gd0fec80-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libgd2

Package

Name
libgd2
Purl
pkg:deb/debian/libgd2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3-87-gd0fec80-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libgd2

Package

Name
libgd2
Purl
pkg:deb/debian/libgd2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3-87-gd0fec80-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / libgd2

Package

Name
libgd2
Purl
pkg:deb/debian/libgd2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3-87-gd0fec80-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}