Source: libgd2 Version: 2.2.5-5.2 Severity: important Tags: security upstream Forwarded: https://github.com/libgd/libgd/pull/580 Control: found -1 2.2.4-2+deb9u5 Control: found -1 2.2.4-2
Hi, The following vulnerability was published for libgd2. CVE-2018-14553[0]: | gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL | pointer dereference allowing attackers to crash an application via a | specific function call sequence. Only affects PHP when linked with an | external libgd (not bundled). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-14553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553 [1] https://github.com/libgd/libgd/pull/580 [2] https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f Please adjust the affected versions in the BTS as needed. Regards, Salvatore