Source: libgd2
Version: 2.2.5-5.2
Severity: important
Tags: security upstream
Forwarded: https://github.com/libgd/libgd/pull/580
Control: found -1 2.2.4-2+deb9u5
Control: found -1 2.2.4-2

Hi,

The following vulnerability was published for libgd2.

CVE-2018-14553[0]:
| gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL
| pointer dereference allowing attackers to crash an application via a
| specific function call sequence. Only affects PHP when linked with an
| external libgd (not bundled).


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-14553
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553
[1] https://github.com/libgd/libgd/pull/580
[2] 
https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to