MGASA-2017-0246

Source
https://advisories.mageia.org/MGASA-2017-0246.html
Import Source
https://advisories.mageia.org/MGASA-2017-0246.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0246
Related
Published
2017-08-07T22:16:24Z
Modified
2017-08-07T22:01:25Z
Summary
Updated php and libgd packages fix security vulnerabilities
Details

Buffer over-read into uninitialized memory in libgd (CVE-2017-7890).

Security issues from bundled oniguruma in php-mbstring (CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229).

References
Credits

Affected packages

Mageia:6 / libgd

Package

Name
libgd
Purl
pkg:rpm/mageia/libgd?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.4-3.1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / php

Package

Name
php
Purl
pkg:rpm/mageia/php?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.6.31-1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / libgd

Package

Name
libgd
Purl
pkg:rpm/mageia/libgd?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.4-1.2.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / php

Package

Name
php
Purl
pkg:rpm/mageia/php?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.6.31-1.mga5

Ecosystem specific

{
    "section": "core"
}