First published: Tue Feb 03 2015(Updated: )
Possible buffer read overflow was fixed upstream [1]. This was also reported against PHP: <a href="https://bugs.php.net/bug.php?id=68601">https://bugs.php.net/bug.php?id=68601</a> (bug is private, fixed in PHP 5.6.5) [1]: <a href="https://bitbucket.org/libgd/gd-libgd/commits/47eb44b2e90ca88a08dca9f9a1aa9041e9587f43">https://bitbucket.org/libgd/gd-libgd/commits/47eb44b2e90ca88a08dca9f9a1aa9041e9587f43</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php | <5.5.21 | 5.5.21 |
redhat/php | <5.6.5 | 5.6.5 |
redhat/gd | <2.1.1 | 2.1.1 |
PHP PHP | >=5.4.0<5.4.40 | |
PHP PHP | >=5.5.0<5.5.21 | |
PHP PHP | >=5.6.0<5.6.5 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Libgd Libgd | <=2.1.1 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Canonical Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.