Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at
Bug 1391068 (CVE-2016-8670) - CVE-2016-8670 gd, php: Stack based buffer overflow in dynamicGetbuf
Summary: CVE-2016-8670 gd, php: Stack based buffer overflow in dynamicGetbuf
Alias: CVE-2016-8670
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1391076 1391077
TreeView+ depends on / blocked
Reported: 2016-11-02 14:01 UTC by Adam Mariš
Modified: 2019-09-29 13:59 UTC (History)
20 users (show)

Fixed In Version: php 5.6.27, php 7.0.11, php 7.1.0
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in gd. Integer underflow in a calculation in dynamicGetbuf() was incorrectly handled, leading in some circumstances to an out of bounds write through a very large argument to memcpy(). An attacker could create a crafted image that would lead to a crash or, potentially, code execution.
Clone Of:
Last Closed: 2017-02-21 09:39:45 UTC

Attachments (Terms of Use)

Description Adam Mariš 2016-11-02 14:01:19 UTC
Stack based buffer overflow was found in dynamicGetbuf when passing negative `rlen` as size to memcpy().

PHP bug:

GD patch:

PHP patch:;a=commit;h=cc08cbc84d46933c1e9e0149633f1ed5d19e45e9

CVE assignment:

Comment 1 Adam Mariš 2016-11-02 14:11:05 UTC
Created gd tracking bugs for this issue:

Affects: fedora-all [bug 1391077]

Comment 2 Adam Mariš 2016-11-02 14:11:18 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1391076]

Note You need to log in before you can comment on or make changes to this bug.