Control: tags -1 + patch On Sun, Jan 27, 2019 at 09:11:16PM +0100, Salvatore Bonaccorso wrote: > Source: libgd2 > Version: 2.2.5-5 > Severity: grave > Tags: security upstream > Justification: user security hole > Control: found -1 2.2.4-2+deb9u3 > Control: found -1 2.2.4-2 > > Hi, > > The following vulnerability was published for libgd2. > > CVE-2019-6977[0]: > | gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka > | LibGD) 2.2.5, as used in the imagecolormatch function in PHP before > | 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, > | has a heap-based buffer overflow. This can be exploited by an attacker > | who is able to trigger imagecolormatch calls with crafted image data.
Pending in git as https://salsa.debian.org/debian/libgd2/commit/2d7d3b68bb79843e5271a05543e996fd5a3a8cd1 Regards, Salvatore > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2019-6977 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977 > [1] https://bugs.php.net/bug.php?id=77270 > [2] https://gist.github.com/cmb69/1f36d285eb297ed326f5c821d7aafced > > Regards, > Salvatore