Debian Security Advisory
DLA-1651-1 libgd2 -- LTS security update
- Date Reported:
- 30 Jan 2019
- Affected Packages:
- libgd2
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-5711, CVE-2018-1000222, CVE-2019-6977, CVE-2019-6978.
- More information:
-
Several issues in libgd2, a graphics library that allows to quickly draw images, have been found.
- CVE-2019-6977
A potential double free in gdImage*Ptr() has been reported by Solmaz Salimi (aka. Rooney).
- CVE-2019-6978
Simon Scannell found a heap-based buffer overflow, exploitable with crafted image data.
- CVE-2018-1000222
A new double free vulnerabilities in gdImageBmpPtr() has been reported by Solmaz Salimi (aka. Rooney).
- CVE-2018-5711
Due to an integer signedness error the GIF core parsing function can enter an infinite loop. This will lead to a Denial of Service and exhausted server resources.
For Debian 8
Jessie
, these problems have been fixed in version 2.1.0-5+deb8u12.We recommend that you upgrade your libgd2 packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2019-6977