You are here
Home > Preporuke > Ranjivosti programske biblioteke gd

Ranjivosti programske biblioteke gd

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

Fedora Update Notification
2016-06-02 09:08:25.193647

Name : gd
Product : Fedora 23
Version : 2.1.1
Release : 6.fc23
Summary : A graphics library for quick creation of PNG or JPEG images
Description :
The gd graphics library allows your code to quickly draw images
complete with lines, arcs, text, multiple colors, cut and paste from
other images, and flood fills, and to write out the result as a PNG or
JPEG file. This is particularly useful in Web applications, where PNG
and JPEG are two of the formats accepted for inline images by most
browsers. Note that gd is not a paint program.

Update Information:

Security fix for CVE-2015-8877 — Security fix for CVE-2016-5116

[ 1 ] Bug #1338907 – CVE-2015-8877 gd: gdImageScaleTwoPass function in gd_interpolation.c uses inconsistent allocate and free approaches
[ 2 ] Bug #1340856 – CVE-2016-5116 gd: Information leak due to stack overflow in gdCtxPrintf

This update can be installed with the “yum” update program. Use
su -c ‘yum update gd’ at the command line.
For more information, refer to “Managing Software with yum”,
available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list

AutorTomislav Protega
Cert idNCERT-REF-2016-06-0020-ADV
CveCVE-2015-8877 CVE-2016-5116
ID izvornika2016-06-02 09:08:25.193647
More in Preporuke
Ranjivosti programskog paketa phpmyadmin

Otkrivene su ranjivosti u programskom paketu phpmyadmin za Fedoru. Potencijalni udaljeni napadači ranjivosti bi mogli iskoristiti za otkrivanje osjetljivih informacija,...