The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.
{ "binaries": [ { "binary_name": "libgd-dbg", "binary_version": "2.1.0-3ubuntu0.1" }, { "binary_name": "libgd-dev", "binary_version": "2.1.0-3ubuntu0.1" }, { "binary_name": "libgd-tools", "binary_version": "2.1.0-3ubuntu0.1" }, { "binary_name": "libgd-tools-dbgsym", "binary_version": "2.1.0-3ubuntu0.1" }, { "binary_name": "libgd2-noxpm-dev", "binary_version": "2.1.0-3ubuntu0.1" }, { "binary_name": "libgd2-xpm-dev", "binary_version": "2.1.0-3ubuntu0.1" }, { "binary_name": "libgd3", "binary_version": "2.1.0-3ubuntu0.1" }, { "binary_name": "libgd3-dbgsym", "binary_version": "2.1.0-3ubuntu0.1" } ], "ubuntu_priority": "low", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libgd-dbg", "binary_version": "2.1.1-4ubuntu0.16.04.1" }, { "binary_name": "libgd-dev", "binary_version": "2.1.1-4ubuntu0.16.04.1" }, { "binary_name": "libgd-dev-dbgsym", "binary_version": "2.1.1-4ubuntu0.16.04.1" }, { "binary_name": "libgd-tools", "binary_version": "2.1.1-4ubuntu0.16.04.1" }, { "binary_name": "libgd-tools-dbgsym", "binary_version": "2.1.1-4ubuntu0.16.04.1" }, { "binary_name": "libgd3", "binary_version": "2.1.1-4ubuntu0.16.04.1" }, { "binary_name": "libgd3-dbgsym", "binary_version": "2.1.1-4ubuntu0.16.04.1" } ], "ubuntu_priority": "low", "availability": "No subscription required" }