First published: Tue Jan 15 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libwmf | <0:0.2.8.4-44.el7 | 0:0.2.8.4-44.el7 |
redhat/libwmf | <0:0.2.9-8.el8_0 | 0:0.2.9-8.el8_0 |
redhat/gd | <0:2.2.5-7.el8 | 0:2.2.5-7.el8 |
debian/libgd2 | <=2.2.4-2+deb9u3<=2.2.4-2<=2.2.5-5 | 2.2.5-5.1 2.2.4-2+deb9u4 |
Libgd Libgd | =2.2.5 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
debian/libgd2 | 2.3.0-2 2.3.3-9 2.3.3-12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-6978 is a vulnerability in the GD Graphics Library (LibGD) 2.2.5 that allows for a double free in the gdImage*Ptr() functions.
The severity of CVE-2019-6978 is critical with a CVSS score of 9.8.
The affected software includes libwmf, gd, libgd2, and various versions of Debian and Ubuntu Linux distributions.
To fix CVE-2019-6978, you should update to the recommended versions of the affected software packages.
You can find more information about CVE-2019-6978 on the GitHub pages for LibGD and PHP.