Back to bug 1391068

Who When What Removed Added
Adam Mariš 2016-11-02 14:10:41 UTC Depends On 1391076
Adam Mariš 2016-11-02 14:10:52 UTC Depends On 1391077
Adam Mariš 2016-11-02 14:12:25 UTC Blocks 1391079
Norman Sardella 2016-11-03 13:10:48 UTC CC sardella
Doran Moppert 2016-11-04 05:57:56 UTC Blocks 1391079 1388796
Ján Rusnačko 2016-11-04 12:43:59 UTC Depends On 1391936
Ján Rusnačko 2016-11-04 12:45:20 UTC Depends On 1391936
Doran Moppert 2016-11-21 03:33:18 UTC CC dmoppert
Doran Moppert 2016-12-05 06:15:50 UTC Doc Text A vulnerability was found in gd. Integer underflow in a calculation in dynamicGetbuf() was incorrectly handled, leading in some circumstances to an out of bounds write through a very large argument to memcpy(). An attacker could create a crafted image that would lead to a crash, or, potentially code execution.
Doran Moppert 2016-12-05 06:21:55 UTC Whiteboard impact=moderate,public=20161010,reported=20161013,source=internet,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-121,rhel-5/php=new,rhel-5/gd=new,rhel-5/php53=new,rhel-6/php=new,rhel-6/gd=new,rhel-7/php=new,rhel-7/gd=new,rhscl-2/rh-php56-php=new,rhscl-2/rh-php70-php=new,openshift-enterprise-2/php=new,openshift-enterprise-2/gd=new,fedora-all/php=affected,fedora-all/gd=affected impact=moderate,public=20161010,reported=20161013,source=internet,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-121,rhel-5/php=wontfix,rhel-5/gd=wontfix,rhel-5/php53=wontfix,rhel-6/php=wontfix,rhel-6/gd=wontfix,rhel-7/php=wontfix,rhel-7/gd=wontfix,rhscl-2/rh-php56-php=new,rhscl-2/rh-php70-php=new,openshift-enterprise-2/php=wontfix,openshift-enterprise-2/gd=wontfix,fedora-all/php=affected,fedora-all/gd=affected
Eric Christensen 2016-12-05 14:49:22 UTC Doc Text A vulnerability was found in gd. Integer underflow in a calculation in dynamicGetbuf() was incorrectly handled, leading in some circumstances to an out of bounds write through a very large argument to memcpy(). An attacker could create a crafted image that would lead to a crash, or, potentially code execution. A vulnerability was found in gd. Integer underflow in a calculation in dynamicGetbuf() was incorrectly handled, leading in some circumstances to an out of bounds write through a very large argument to memcpy(). An attacker could create a crafted image that would lead to a crash or, potentially, code execution.
Doran Moppert 2016-12-15 05:39:07 UTC Fixed In Version php 5.6.27, php 7.0.11 php 5.6.27, php 7.0.11, php 7.1.0
Doran Moppert 2016-12-15 05:42:25 UTC Blocks 1404738
Doran Moppert 2016-12-16 04:29:35 UTC Blocks 1388796
Cedric Buissart 2017-02-15 13:44:51 UTC Whiteboard impact=moderate,public=20161010,reported=20161013,source=internet,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-121,rhel-5/php=wontfix,rhel-5/gd=wontfix,rhel-5/php53=wontfix,rhel-6/php=wontfix,rhel-6/gd=wontfix,rhel-7/php=wontfix,rhel-7/gd=wontfix,rhscl-2/rh-php56-php=new,rhscl-2/rh-php70-php=new,openshift-enterprise-2/php=wontfix,openshift-enterprise-2/gd=wontfix,fedora-all/php=affected,fedora-all/gd=affected impact=moderate,public=20161010,reported=20161013,source=internet,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-121,rhel-5/php=wontfix,rhel-5/gd=wontfix,rhel-5/php53=wontfix,rhel-6/php=wontfix,rhel-6/gd=wontfix,rhel-7/php=wontfix,rhel-7/gd=wontfix,rhscl-2/rh-php56-php=wontfix,rhscl-2/rh-php70-php=wontfix,openshift-enterprise-2/php=wontfix,openshift-enterprise-2/gd=wontfix,fedora-all/php=affected,fedora-all/gd=affected
Cedric Buissart 2017-02-21 09:39:45 UTC Status NEW CLOSED
Resolution --- WONTFIX
Last Closed 2017-02-21 04:39:45 UTC
Product Security DevOps Team 2019-09-29 13:59:56 UTC Whiteboard impact=moderate,public=20161010,reported=20161013,source=internet,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-121,rhel-5/php=wontfix,rhel-5/gd=wontfix,rhel-5/php53=wontfix,rhel-6/php=wontfix,rhel-6/gd=wontfix,rhel-7/php=wontfix,rhel-7/gd=wontfix,rhscl-2/rh-php56-php=wontfix,rhscl-2/rh-php70-php=wontfix,openshift-enterprise-2/php=wontfix,openshift-enterprise-2/gd=wontfix,fedora-all/php=affected,fedora-all/gd=affected

Back to bug 1391068