Date: Wed, 13 Aug 2008 12:53:04 +0200 From: Christian Hoffmann <hoffie@...too.org> To: oss-security@...ts.openwall.com CC: coley@...re.org Subject: Re: CVE request: php-5.2.6 overflow issues On 2008-08-13 02:45, Steven M. Christey wrote: > On Fri, 8 Aug 2008, Christian Hoffmann wrote: > >> two security issues, which might possibly allow for arbitrary code >> execution (afaik nobody has analyzed the details...), but at least DoS >> (think of FastCGI setups), were silently fixed in PHP again: >> >> * Overflow in ext/gd's imageloadfont() function    > > Use CVE-2008-3658, to be filled in later - I'm assuming this is a distinct > component that doesn't just affect PHP. Pierre from php and libgd upstream just confirmed that the vulnerable code is only present in php's copy (fork) of libgd. The independent libgd library is not vulnerable to this problem. -- Christian Hoffmann Download attachment "signature.asc" of type "application/pgp-signature" (261 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.