—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-4384-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 04, 2019 https://www.debian.org/security/faq
– ————————————————————————-
Package : libgd2
CVE ID : CVE-2019-6977 CVE-2019-6978
Debian Bug : 920645 920728
Multiple vulnerabilities have been discovered in libgd2, a library for
programmatic graphics creation and manipulation, which may result in
denial of service or potentially the execution of arbitrary code if a
malformed file is processed.
For the stable distribution (stretch), these problems have been fixed in
version 2.2.4-2+deb9u4.
We recommend that you upgrade your libgd2 packages.
For the detailed security status of libgd2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/libgd2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=QL/8
—–END PGP SIGNATURE—–