gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "libgd2-xpm-dev": "2.1.0-3ubuntu0.11+esm1", "libgd-dev": "2.1.0-3ubuntu0.11+esm1", "libgd3-dbgsym": "2.1.0-3ubuntu0.11+esm1", "libgd3": "2.1.0-3ubuntu0.11+esm1", "libgd-dbg": "2.1.0-3ubuntu0.11+esm1", "libgd2-noxpm-dev": "2.1.0-3ubuntu0.11+esm1", "libgd-tools": "2.1.0-3ubuntu0.11+esm1", "libgd-tools-dbgsym": "2.1.0-3ubuntu0.11+esm1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libgd-dev": "2.1.1-4ubuntu0.16.04.12", "libgd3-dbgsym": "2.1.1-4ubuntu0.16.04.12", "libgd3": "2.1.1-4ubuntu0.16.04.12", "libgd-dbg": "2.1.1-4ubuntu0.16.04.12", "libgd-dev-dbgsym": "2.1.1-4ubuntu0.16.04.12", "libgd-tools": "2.1.1-4ubuntu0.16.04.12", "libgd-tools-dbgsym": "2.1.1-4ubuntu0.16.04.12" } ] }