Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0146

Опубликовано: 28 фев. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0146: Moderate: gd security update (MODERATE)

[2.0.28-5.E4.1]

  • security fixes
  • Resolves: #432784

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

gd

2.0.33-9.4.el5_1.1

gd-devel

2.0.33-9.4.el5_1.1

gd-progs

2.0.33-9.4.el5_1.1

Oracle Linux x86_64

gd

2.0.33-9.4.el5_1.1

gd-devel

2.0.33-9.4.el5_1.1

gd-progs

2.0.33-9.4.el5_1.1

Oracle Linux i386

gd

2.0.33-9.4.el5_1.1

gd-devel

2.0.33-9.4.el5_1.1

gd-progs

2.0.33-9.4.el5_1.1

Связанные уязвимости

ubuntu
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

redhat
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

nvd
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

debian
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in ...

fstec
почти 18 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации