#VU21274 Out-of-bounds read in libgd - CVE-2019-11038
Published: September 23, 2019 / Updated: April 3, 2020
libgd
GD Software
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD). A remote attacker can create a specially crafted image, pass it to the affected application, trigger out-of-bounds read error and read contents of memory on the system.
Remediation
External links
- https://access.redhat.com/errata/RHSA-2019:2519
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821
- https://bugs.php.net/bug.php?id=77973
- https://bugzilla.redhat.com/show_bug.cgi?id=1724149
- https://bugzilla.redhat.com/show_bug.cgi?id=1724432
- https://bugzilla.suse.com/show_bug.cgi?id=1140118
- https://bugzilla.suse.com/show_bug.cgi?id=1140120
- https://github.com/libgd/libgd/issues/501
- https://lists.debian.org/debian-lts-announce/2019/06/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKSSWFR2WPMUOIB5EN5ZM252NNEPYUTG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAZBVK6XNYEIN7RDQXESSD63QHXPLKWL/