The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2.1.0-3ubuntu0.1", "binary_name": "libgd-dbg" }, { "binary_version": "2.1.0-3ubuntu0.1", "binary_name": "libgd-dev" }, { "binary_version": "2.1.0-3ubuntu0.1", "binary_name": "libgd-tools" }, { "binary_version": "2.1.0-3ubuntu0.1", "binary_name": "libgd-tools-dbgsym" }, { "binary_version": "2.1.0-3ubuntu0.1", "binary_name": "libgd2-noxpm-dev" }, { "binary_version": "2.1.0-3ubuntu0.1", "binary_name": "libgd2-xpm-dev" }, { "binary_version": "2.1.0-3ubuntu0.1", "binary_name": "libgd3" }, { "binary_version": "2.1.0-3ubuntu0.1", "binary_name": "libgd3-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2.1.1-4ubuntu0.16.04.1", "binary_name": "libgd-dbg" }, { "binary_version": "2.1.1-4ubuntu0.16.04.1", "binary_name": "libgd-dev" }, { "binary_version": "2.1.1-4ubuntu0.16.04.1", "binary_name": "libgd-dev-dbgsym" }, { "binary_version": "2.1.1-4ubuntu0.16.04.1", "binary_name": "libgd-tools" }, { "binary_version": "2.1.1-4ubuntu0.16.04.1", "binary_name": "libgd-tools-dbgsym" }, { "binary_version": "2.1.1-4ubuntu0.16.04.1", "binary_name": "libgd3" }, { "binary_version": "2.1.1-4ubuntu0.16.04.1", "binary_name": "libgd3-dbgsym" } ] }