First published: Tue Apr 26 2016(Updated: )
Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | <7.0.6 | 7.0.6 |
Libgd Libgd | =2.1.1 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | =23 | |
Fedoraproject Fedora | =24 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Canonical Ubuntu Linux | =16.04 | |
openSUSE openSUSE | =13.2 | |
PHP PHP | >=5.5.0<5.5.35 | |
PHP PHP | >=5.6.0<5.6.21 | |
PHP PHP | >=7.0.0<7.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.