Vulnerability Description
The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libgd | Libgd | 2.2.5 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 14.04 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html
- https://access.redhat.com/errata/RHSA-2019:2722
- https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0PatchThird Party Advisory
- https://github.com/libgd/libgd/issues/492PatchThird Party Advisory
- https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2aePatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/01/msg00028.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/201903-18Third Party Advisory
- https://usn.ubuntu.com/3900-1/Third Party Advisory
- https://www.debian.org/security/2019/dsa-4384Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html
FAQ
What is CVE-2019-6978?
CVE-2019-6978 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.
How severe is CVE-2019-6978?
CVE-2019-6978 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-6978?
Check the references section above for vendor advisories and patch information. Affected products include: Libgd Libgd, Debian Debian Linux, Canonical Ubuntu Linux.