libgd2 packages updated to fix arbitrary code execution due to integer overflow vulnerabilities.
Reporter | Title | Published | Views | Family All 84 |
---|---|---|---|---|
OSV | Red Hat Security Advisory: gd security update | 5 Nov 202416:25 | – | osv |
OSV | libgd1 - integer overflow | 29 Nov 200400:00 | – | osv |
OSV | libgd2 - integer overlow | 29 Nov 200400:00 | – | osv |
OSV | libgd - integer overflows | 9 Nov 200400:00 | – | osv |
OSV | libgd2 - integer overflows | 9 Nov 200400:00 | – | osv |
OSV | Red Hat Security Advisory: gd security update | 14 Aug 202420:19 | – | osv |
Debian CVE | CVE-2004-0990 | 1 Mar 200505:00 | – | debiancve |
Debian CVE | CVE-2004-0941 | 9 Feb 200505:00 | – | debiancve |
OpenVAS | FreeBSD Ports: gd, uk-gd, ja-gd | 4 Sep 200800:00 | – | openvas |
OpenVAS | FreeBSD Ports: gd, uk-gd, ja-gd | 4 Sep 200800:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | s390 | libgd-dev | 1.8.4-17.woody4 | libgd-dev_1.8.4-17.woody4_s390.deb |
Debian | 3 | mipsel | libgd1-noxpm | 1.8.4-17.woody4 | libgd1-noxpm_1.8.4-17.woody4_mipsel.deb |
Debian | 3 | i386 | libgd-tools | 2.0.1-10woody2 | libgd-tools_2.0.1-10woody2_i386.deb |
Debian | 3 | arm | libgd-dev | 1.8.4-17.woody4 | libgd-dev_1.8.4-17.woody4_arm.deb |
Debian | 3 | i386 | libgd-dev | 1.8.4-17.woody4 | libgd-dev_1.8.4-17.woody4_i386.deb |
Debian | 3 | alpha | libgd2-dev | 2.0.1-10woody2 | libgd2-dev_2.0.1-10woody2_alpha.deb |
Debian | 3 | i386 | libgd2-dev | 2.0.1-10woody2 | libgd2-dev_2.0.1-10woody2_i386.deb |
Debian | 3 | powerpc | libgd-noxpm-dev | 1.8.4-17.woody4 | libgd-noxpm-dev_1.8.4-17.woody4_powerpc.deb |
Debian | 3 | arm | libgd-tools | 2.0.1-10woody2 | libgd-tools_2.0.1-10woody2_arm.deb |
Debian | 3 | mipsel | libgd1 | 1.8.4-17.woody4 | libgd1_1.8.4-17.woody4_mipsel.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo