Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2014-2497

Published: 21 March 2014

The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.

Notes

AuthorNote
mdeslaur
php5 uses the system libgd2
php5 in quantal and earlier aren't built with xpm support

Priority

Low

Status

Package Release Status
libgd2
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (2.0.36~rc1~dfsg-6ubuntu2.1)
quantal Ignored
(reached end-of-life)
saucy Ignored
(reached end-of-life)
trusty
Released (2.1.0-3ubuntu0.1)
upstream
Released (2.1.0-4)
utopic Ignored
(reached end-of-life)
vivid Not vulnerable
(2.1.0-5)
wily Not vulnerable
(2.1.0-5)
xenial Not vulnerable
(2.1.0-5)
Patches:
upstream: https://bitbucket.org/libgd/gd-libgd/commits/463c3bd09bfe8e924e19acad7a2a6af16953a704
php5
Launchpad, Ubuntu, Debian
lucid Not vulnerable
(uses system gd)
precise Not vulnerable
(uses system gd)
quantal Not vulnerable
(uses system gd)
saucy Not vulnerable
(uses system gd)
trusty Not vulnerable
(uses system gd)
upstream Needs triage

utopic Not vulnerable
(uses system gd)
vivid Not vulnerable
(uses system gd)
wily Not vulnerable
(uses system gd)
xenial Does not exist