The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libgd2-xpm-dev": "2.1.0-3ubuntu0.1", "libgd-dev": "2.1.0-3ubuntu0.1", "libgd3-dbgsym": "2.1.0-3ubuntu0.1", "libgd3": "2.1.0-3ubuntu0.1", "libgd-dbg": "2.1.0-3ubuntu0.1", "libgd2-noxpm-dev": "2.1.0-3ubuntu0.1", "libgd-tools": "2.1.0-3ubuntu0.1", "libgd-tools-dbgsym": "2.1.0-3ubuntu0.1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libgd-dev": "2.1.1-4ubuntu0.16.04.1", "libgd3-dbgsym": "2.1.1-4ubuntu0.16.04.1", "libgd3": "2.1.1-4ubuntu0.16.04.1", "libgd-dbg": "2.1.1-4ubuntu0.16.04.1", "libgd-dev-dbgsym": "2.1.1-4ubuntu0.16.04.1", "libgd-tools": "2.1.1-4ubuntu0.16.04.1", "libgd-tools-dbgsym": "2.1.1-4ubuntu0.16.04.1" } ] }