Summary: | media-libs/gd Buffer overflow (CVE-2007-0455) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Sune Kloppenborg Jeppesen (RETIRED)
![]() Seems like it's already fixed in 2.0.34 From source: { ch = c & 0xFF; /* don't extend sign */ } if (*next) next++; } break; case gdFTEX_Big5: From RH patch: RCS file: /repository/gd/libgd/gdft.c,v retrieving revision 1.28 diff -u -p -r1.28 gdft.c --- gdft.c 3 Jan 2007 21:21:21 -0000 1.28 +++ gdft.c 24 Jan 2007 23:00:55 -0000 @@ -1178,7 +1178,7 @@ fprintf(stderr,"dpi=%d,%d metric_res=%d { ch = c & 0xFF; /* don't extend sign */ } - next++; + if (*next) next++; } break; case gdFTEX_Big5: Seeing the notice on heise.de I had a look at gd-2.0.34 and it's definitely not fixed. Uh, sorry, looked in the wrong line. |