Control: tags -1 + patch

On Sun, Jan 27, 2019 at 09:11:16PM +0100, Salvatore Bonaccorso wrote:
> Source: libgd2
> Version: 2.2.5-5
> Severity: grave
> Tags: security upstream
> Justification: user security hole
> Control: found -1 2.2.4-2+deb9u3
> Control: found -1 2.2.4-2
> 
> Hi,
> 
> The following vulnerability was published for libgd2.
> 
> CVE-2019-6977[0]:
> | gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka
> | LibGD) 2.2.5, as used in the imagecolormatch function in PHP before
> | 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1,
> | has a heap-based buffer overflow. This can be exploited by an attacker
> | who is able to trigger imagecolormatch calls with crafted image data.

Pending in git as 
https://salsa.debian.org/debian/libgd2/commit/2d7d3b68bb79843e5271a05543e996fd5a3a8cd1

Regards,
Salvatore
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2019-6977
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977
> [1] https://bugs.php.net/bug.php?id=77270
> [2] https://gist.github.com/cmb69/1f36d285eb297ed326f5c821d7aafced
> 
> Regards,
> Salvatore

Reply via email to