package/gd: add post-2.2.5 security fixes from upstream
authorPeter Korsgaard <peter@korsgaard.com>
Sun, 20 Oct 2019 09:05:10 +0000 (11:05 +0200)
committerThomas Petazzoni <thomas.petazzoni@bootlin.com>
Mon, 21 Oct 2019 19:45:31 +0000 (21:45 +0200)
commit505a70edbe3656a3cce3b4a776f7af510cc778d6
tree4e4bc30d0982165cfc412054ee05957a911d8c3d
parente1281472ec925fb114bbac080110c159fc721867
package/gd: add post-2.2.5 security fixes from upstream

Fixes the following security vulnerablities:

- CVE-2018-1000222: Libgd version 2.2.5 contains a Double Free Vulnerability
  vulnerability in gdImageBmpPtr Function that can result in Remote Code
  Execution .  This attack appear to be exploitable via Specially Crafted
  Jpeg Image can trigger double free

- CVE-2018-5711: gd_gif_in.c in the GD Graphics Library (aka libgd), as used
  in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x
  before 7.2.1, has an integer signedness error that leads to an infinite
  loop via a crafted GIF file, as demonstrated by a call to the
  imagecreatefromgif or imagecreatefromstring PHP function

- CVE-2019-11038: When using the gdImageCreateFromXbm() function in the GD
  Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP
  versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it
  is possible to supply data that will cause the function to use the value
  of uninitialized variable.  This may lead to disclosing contents of the
  stack that has been left there by previous code

- CVE-2019-6978: The GD Graphics Library (aka LibGD) 2.2.5 has a double free
  in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
package/gd/0001-bmp-check-return-value-in-gdImageBmpPtr.patch [new file with mode: 0644]
package/gd/0002-Fix-420-Potential-infinite-loop-in-gdImageCreateFrom.patch [new file with mode: 0644]
package/gd/0003-Fix-501-Uninitialized-read-in-gdImageCreateFromXbm-C.patch [new file with mode: 0644]
package/gd/0004-Fix-492-Potential-double-free-in-gdImage-Ptr.patch [new file with mode: 0644]