View | Details | Raw Unified | Return to bug 213023
Collapse All | Expand All

(-)security/vuxml/vuln.xml (working copy) (+34 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="2a526c78-84ab-11e6-a4a1-60a44ce6887b">
62
    <topic>libgd -- integer overflow which could lead to heap buffer overflow</topic>
63
    <affects>
64
      <package>
65
       <name>gd</name>
66
       <range><le>2.2.3</le></range>
67
      </package>
68
      <package>
69
       <name>php70-gd</name>
70
       <range><le>7.0.11</le></range>
71
      </package>
72
      <package>
73
       <name>php56-gd</name>
74
       <range><le>5.6.26</le></range>
75
      </package>
76
    </affects>
77
    <description>
78
      <body xmlns="http://www.w3.org/1999/xhtml">
79
       <p>LibGD reports:</p>
80
       <blockquote cite="https://github.com/libgd/libgd/issues/308">
81
         <p>An integer overflow issue was found in function gdImageWebpCtx of file gd_webp.c which could lead to heap buffer overflow.</p>
82
       </blockquote>
83
      </body>
84
    </description>
85
    <references>
86
      <url>https://github.com/libgd/libgd/issues/308</url>
87
      <url>https://bugs.php.net/bug.php?id=73003</url>
88
    </references>
89
    <dates>
90
      <discovery>2016-09-02</discovery>
91
      <entry>2016-09-27</entry>
92
    </dates>
93
  </vuln>
94
61
  <vuln vid="91a337d8-83ed-11e6-bf52-b499baebfeaf">
95
  <vuln vid="91a337d8-83ed-11e6-bf52-b499baebfeaf">
62
    <topic>OpenSSL -- multiple vulnerabilities</topic>
96
    <topic>OpenSSL -- multiple vulnerabilities</topic>
63
    <affects>
97
    <affects>

Return to bug 213023