First published: Thu Feb 28 2019(Updated: )
It was discovered that GD incorrectly handled memory when processing certain images. A remote attacker could use this issue with a specially crafted image file to cause GD to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libgd-tools | <2.2.5-4ubuntu1.1 | 2.2.5-4ubuntu1.1 |
=18.10 | ||
All of | ||
ubuntu/libgd3 | <2.2.5-4ubuntu1.1 | 2.2.5-4ubuntu1.1 |
=18.10 | ||
All of | ||
ubuntu/libgd-tools | <2.2.5-4ubuntu0.3 | 2.2.5-4ubuntu0.3 |
=18.04 | ||
All of | ||
ubuntu/libgd3 | <2.2.5-4ubuntu0.3 | 2.2.5-4ubuntu0.3 |
=18.04 | ||
All of | ||
ubuntu/libgd-tools | <2.1.1-4ubuntu0.16.04.11 | 2.1.1-4ubuntu0.16.04.11 |
=16.04 | ||
All of | ||
ubuntu/libgd3 | <2.1.1-4ubuntu0.16.04.11 | 2.1.1-4ubuntu0.16.04.11 |
=16.04 | ||
All of | ||
ubuntu/libgd-tools | <2.1.0-3ubuntu0.11 | 2.1.0-3ubuntu0.11 |
=14.04 | ||
All of | ||
ubuntu/libgd3 | <2.1.0-3ubuntu0.11 | 2.1.0-3ubuntu0.11 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-3900-1.
GD incorrectly handles memory when processing certain images, which can allow a remote attacker to cause a denial of service or execute arbitrary code.
The libgd-tools package versions 2.2.5-4ubuntu1.1, 2.2.5-4ubuntu0.3, and 2.1.1-4ubuntu0.16.04.11, as well as the libgd3 package versions 2.2.5-4ubuntu1.1, 2.2.5-4ubuntu0.3, 2.1.1-4ubuntu0.16.04.11, 2.1.0-3ubuntu0.11 are affected.
An attacker can exploit this vulnerability by providing a specially crafted image file to GD.
To fix this vulnerability, update to the following package versions: libgd-tools 2.2.5-4ubuntu1.1, libgd3 2.2.5-4ubuntu1.1, libgd-tools 2.2.5-4ubuntu0.3, libgd3 2.2.5-4ubuntu0.3, libgd-tools 2.1.1-4ubuntu0.16.04.11, libgd3 2.1.1-4ubuntu0.16.04.11, libgd-tools 2.1.0-3ubuntu0.11, and libgd3 2.1.0-3ubuntu0.11.