First published: Sat Aug 06 2016(Updated: )
An unsigned integer overflow vulnerability was found in _gdContributionsAlloc function. Upstream patch: <a href="https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35">https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35</a> CVE assignment: <a href="http://www.openwall.com/lists/oss-security/2017/01/28/6">http://www.openwall.com/lists/oss-security/2017/01/28/6</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php71-php | <0:7.1.30-1.el7 | 0:7.1.30-1.el7 |
redhat/rh-php72-php | <0:7.2.24-1.el7 | 0:7.2.24-1.el7 |
redhat/gd | <2.2.4 | 2.2.4 |
redhat/php | <5.6.40 | 5.6.40 |
redhat/php | <7.1.26 | 7.1.26 |
redhat/php | <7.2.14 | 7.2.14 |
redhat/php | <7.3.1 | 7.3.1 |
Libgd Libgd | <=2.2.3 | |
<7.1.26 | 7.1.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.