First published: Sat Aug 06 2016(Updated: )
An unsigned integer overflow vulnerability was found in _gdContributionsAlloc function. Upstream patch: <a href="https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35">https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35</a> CVE assignment: <a href="http://www.openwall.com/lists/oss-security/2017/01/28/6">http://www.openwall.com/lists/oss-security/2017/01/28/6</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php71-php | <0:7.1.30-1.el7 | 0:7.1.30-1.el7 |
redhat/rh-php72-php | <0:7.2.24-1.el7 | 0:7.2.24-1.el7 |
redhat/gd | <2.2.4 | 2.2.4 |
redhat/php | <5.6.40 | 5.6.40 |
redhat/php | <7.1.26 | 7.1.26 |
redhat/php | <7.2.14 | 7.2.14 |
redhat/php | <7.3.1 | 7.3.1 |
PHP | <7.1.26 | 7.1.26 |
libgd | <=2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10166 has been classified with a moderate severity due to the potential for an unsigned integer overflow leading to exploitation.
To fix CVE-2016-10166, upgrade to versions 0:7.1.30-1.el7, 0:7.2.24-1.el7 for rh-php71-php and rh-php72-php, or update to gd version 2.2.4.
CVE-2016-10166 affects rh-php71-php, rh-php72-php, PHP versions 5.6.40 and 7.1.26, and gd versions up to 2.2.3.
The impact of CVE-2016-10166 includes potential Denial of Service or remote code execution due to the integer overflow vulnerability.
CVE-2016-10166 was published in January 2017 as part of the ongoing efforts to address vulnerabilities in the libgd library.