MDVSA-2008:038 -- Mandriva gd
|ID: oval:org.secpod.oval:def:301503||Date: (C)2012-01-07 (M)2018-06-02|
|Class: PATCH||Family: unix|
Buffer overflow in the LWZReadByte function in gd_gif_in.c in GD prior to 2.0.34 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array. This was originally fixed in PHP"s embedded GD with MDKSA-2006:162; patches had not been applied to the system libgd at that time. The updated packages have been patched to correct this issue.
|Mandriva Linux 2007.0|