gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1599032 | Issue Tracking Permissions Required |
https://github.com/libgd/libgd/pull/580 | Third Party Advisory |
https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/02/msg00014.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/ | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4316-2/ | Third Party Advisory |
https://usn.ubuntu.com/4316-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2020-02-11 05:15
Updated : 2021-12-30 14:04
NVD link : CVE-2018-14553
Mitre link : CVE-2018-14553
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
libgd
- libgd
fedoraproject
- fedora
canonical
- ubuntu_linux
opensuse
- leap
debian
- debian_linux