Executive Summary

Summary
Title GD Graphics Library vulnerabilities
Informations
Name USN-4316-1 First vendor Publication 2020-04-02
Vendor Ubuntu Last vendor Modification 2020-04-02
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its
derivatives:



- Ubuntu 19.10

- Ubuntu 18.04 LTS

- Ubuntu 16.04 LTS



Summary:



Several security issues were fixed in GD Graphics
Library.




Software Description:

- libgd2: Open source code library for the dynamic creation of
images



Details:



It was discovered that GD Graphics Library incorrectly handled
cloning an

image. An attacker could possibly use this issue to cause GD
Graphics Library

to crash, resulting in a denial of service. (CVE-2018-14553)



It was discovered that GD Graphics Library incorrectly handled
loading images

from X bitmap format files. An attacker could possibly use this
issue to cause

GD Graphics Library to crash, resulting in a denial of service,
or to disclose

contents of the stack that has been left there by previous code.
This issue

only affected Ubuntu 18.04 LTS and Ubuntu 16.04 LTS.
(CVE-2019-11038)
style="font-style: normal; font-variant-ligatures: normal;
font-variant-caps: normal; font-weight: 400; letter-spacing:
normal; text-align: start; text-indent: 0px; text-transform:
none; white-space: normal; word-spacing: 0px;
-webkit-text-stroke-width: 0px; text-decoration-style: initial;
text-decoration-color: initial; font-family: Arial, Helvetica,
sans-serif; font-size: small; background-color: rgb(255, 255,
255);">



Update instructions:



The problem can be corrected by updating your system to the
following

package versions:



Ubuntu 19.10:

テつ libgd-toolsテつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 2.2.5-5.2ubuntu0.19.10.1

テつ libgd3テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 2.2.5-5.2ubuntu0.19.10.1



Ubuntu 18.04 LTS:

テつ libgd-toolsテつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 2.2.5-4ubuntu0.4

テつ libgd3テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 2.2.5-4ubuntu0.4



Ubuntu 16.04 LTS:

テつ libgd-toolsテつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 2.1.1-4ubuntu0.16.04.12

テつ libgd3テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 2.1.1-4ubuntu0.16.04.12



In general, a standard system update will make all the necessary
changes.



References:




Original Source

Url : http://www.ubuntu.com/usn/USN-4316-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 11
Application 887
Application 1
Application 1
Os 5
Os 2
Os 3
Os 1
Os 2
Os 1
Os 2
Os 2
Os 2

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2020-04-03 05:18:47
  • First insertion