Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-2497

Published: 21 March 2014

The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.

Notes

AuthorNote
mdeslaur
php5 uses the system libgd2
php5 in quantal and earlier aren't built with xpm support

Priority

Low

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
wily Not vulnerable
(uses system gd)
xenial Does not exist

lucid Not vulnerable
(uses system gd)
precise Not vulnerable
(uses system gd)
quantal Not vulnerable
(uses system gd)
saucy Not vulnerable
(uses system gd)
trusty Not vulnerable
(uses system gd)
upstream Needs triage

utopic Not vulnerable
(uses system gd)
vivid Not vulnerable
(uses system gd)
libgd2
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise
Released (2.0.36~rc1~dfsg-6ubuntu2.1)
quantal Ignored
(end of life)
saucy Ignored
(end of life)
trusty
Released (2.1.0-3ubuntu0.1)
upstream
Released (2.1.0-4)
utopic Ignored
(end of life)
wily Not vulnerable
(2.1.0-5)
xenial Not vulnerable
(2.1.0-5)
vivid Not vulnerable
(2.1.0-5)
Patches:
upstream: https://bitbucket.org/libgd/gd-libgd/commits/463c3bd09bfe8e924e19acad7a2a6af16953a704