Описание
ELSA-2008-0146: Moderate: gd security update (MODERATE)
[2.0.28-5.E4.1]
- security fixes
- Resolves: #432784
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
gd
2.0.33-9.4.el5_1.1
gd-devel
2.0.33-9.4.el5_1.1
gd-progs
2.0.33-9.4.el5_1.1
Oracle Linux x86_64
gd
2.0.33-9.4.el5_1.1
gd-devel
2.0.33-9.4.el5_1.1
gd-progs
2.0.33-9.4.el5_1.1
Oracle Linux i386
gd
2.0.33-9.4.el5_1.1
gd-devel
2.0.33-9.4.el5_1.1
gd-progs
2.0.33-9.4.el5_1.1
Ссылки на источники
Связанные уязвимости
Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in ...
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации