[<prev] [next>] [day] [month] [year] [list]
Message-ID: <45ac113d.IkDHvV1v1HQ8KM+r%announce-noreply@rpath.com>
Date: Mon, 15 Jan 2007 18:41:49 -0500
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com,
update-announce@...ts.rpath.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
lwn@....net
Subject: rPSA-2007-0008-1 gd
rPath Security Advisory: 2007-0008-1
Published: 2007-01-15
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Indirect Deterministic Denial of Service
Updated Versions:
gd=/conary.rpath.com@rpl:devel//1/2.0.33-4.2-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2906
https://issues.rpath.com/browse/RPL-939
Description:
Previous versions of the libgd package are vulnerable to two denial
of service attacks, one of which has been speculated to possibly
enable a code injection attack. The libgd library is not exposed
via any privileged or remote interfaces within rPath Linux per se,
but it is exposed by some web applications and so may enable a
remote denial of service attack (application crash or unbounded
CPU consumption) against those web applications.
Powered by blists - more mailing lists