In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade RHEL:7
php-pspell
to version 0:5.4.16-42.el7 or higher.
This issue was patched in RHSA-2016:2598
.
Note: Versions mentioned in the description apply only to the upstream php-pspell
package and not the php-pspell
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.