Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2016-10166

Published: 31 December 2016

Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable.

Notes

AuthorNote
mdeslaur
php uses the system libgd2

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
libgd2
Launchpad, Ubuntu, Debian
upstream Needs triage

precise Not vulnerable
(code not present)
trusty
Released (2.1.0-3ubuntu0.6)
xenial
Released (2.1.1-4ubuntu0.16.04.6)
yakkety
Released (2.2.1-1ubuntu3.3)
Patches:
upstream: https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35


php5
Launchpad, Ubuntu, Debian
upstream Needs triage

precise Not vulnerable
(uses system gd)
trusty Not vulnerable
(uses system gd)
xenial Does not exist

yakkety Does not exist

Patches:

upstream: https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35

php7.0
Launchpad, Ubuntu, Debian
upstream Needs triage

precise Does not exist

trusty Does not exist

xenial Not vulnerable
(uses system gd)
yakkety Not vulnerable
(uses system gd)
Patches:


upstream: https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35