First published: Thu Jan 31 2019(Updated: )
The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected. References: <a href="https://github.com/libgd/libgd/issues/492">https://github.com/libgd/libgd/issues/492</a> Upstream Patch: <a href="https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0">https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0</a> <a href="https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae">https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GD Graphics Library |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1671390 is classified as a medium severity due to the potential for a double free attack.
To fix REDHAT-BUG-1671390, update the GD Graphics Library to version 2.2.6 or later, which includes the necessary patches.
Systems utilizing GD Graphics Library version 2.2.5 are affected by REDHAT-BUG-1671390.
No, PHP is not affected by the vulnerability described in REDHAT-BUG-1671390.
The key functions involved in REDHAT-BUG-1671390 are gdImage*Ptr() in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c.