Integer signedness error in the dynamicGetbuf function in gdiodp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd-dbg" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd-dev" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd-tools" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd-tools-dbgsym" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd2-noxpm-dev" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd2-xpm-dev" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd3" }, { "binary_version": "2.1.0-3ubuntu0.5", "binary_name": "libgd3-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-dbg" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-dev" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-dev-dbgsym" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-tools" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd-tools-dbgsym" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd3" }, { "binary_version": "2.1.1-4ubuntu0.16.04.5", "binary_name": "libgd3-dbgsym" } ] }