package/gd: fix CVE-2018-14553 and CVE-2019-6977
authorFabrice Fontaine <fontaine.fabrice@gmail.com>
Fri, 31 Jul 2020 07:51:36 +0000 (09:51 +0200)
committerPeter Korsgaard <peter@korsgaard.com>
Mon, 3 Aug 2020 21:06:56 +0000 (23:06 +0200)
commit6fa1a32dac3cb4ee03fd11bb965cd4b57d14e86a
tree8a2d753f4e0b5c9d618bcc795355d1d02f51d35d
parent654b5d934a7cdab7deca16b374322236de08d472
package/gd: fix CVE-2018-14553 and CVE-2019-6977

- Fix CVE-2018-14553 : gdImageClone in gd.c in libgd 2.1.0-rc2 through
  2.2.5 has a NULL pointer dereference allowing attackers to crash an
  application via a specific function call sequence.

- Fix CVE-2019-6977: gdImageColorMatch in gd_color_match.c in the GD
  Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch
  function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14,
  and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be
  exploited by an attacker who is able to trigger imagecolormatch calls
  with crafted image data.

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/gd/0005-Fix-potential-NULL-pointer-dereference-in-gdImageClone.patch [new file with mode: 0644]
package/gd/0006-Fix-497-gdImageColorMatch-Out-Of-Bounds-Write-on-Heap-CVE-2019-6977.patch [new file with mode: 0644]
package/gd/gd.mk