RLSA-2020:4659

Source
https://errata.rockylinux.org/RLSA-2020:4659
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2020:4659.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2020:4659
Related
Published
2020-11-03T12:24:40Z
Modified
2023-02-02T13:08:53.994116Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H CVSS Calculator
Summary
Moderate: gd security update
Details

GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats.

Security Fix(es):

  • gd: Heap-based buffer overflow in gdImageColorMatch() in gdcolormatch.c (CVE-2019-6977)

  • gd: NULL pointer dereference in gdImageClone (CVE-2018-14553)

  • gd: Double free in the gdImage*Ptr in gdgifout.c, gdjpeg.c, and gdwbmp.c (CVE-2019-6978)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / gd

Package

Name
gd
Purl
pkg:rpm/rocky-linux/gd?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:2.2.5-7.el8