Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd-dbg" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd-dev" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd-tools" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd-tools-dbgsym" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd2-noxpm-dev" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd2-xpm-dev" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd3" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd3-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-dbg" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-dev" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-dev-dbgsym" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-tools" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-tools-dbgsym" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd3" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd3-dbgsym" } ] }