Security update for gd

This update for gd fixes the following security issues:

- CVE-2016-6906: An out-of-bounds read in TGA decompression was fixed which could have lead to crashes. (bsc#1022553)
- CVE-2016-6912: Double free vulnerability in the gdImageWebPtr function
in the GD Graphics Library (aka libgd) allowed remote attackers to have
unspecified impact via large width and height values. (bsc#1022284)
- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
(aka libgd) allowed remote attackers to cause a denial of service
(system hang) via an oversized image. (bsc#1022283)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
functions could lead to memory corruption in the GD Graphics Library (aka libgd) (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
to memory corruption (bsc#1022265)

This update was imported from the SUSE:SLE-12:Update update project.

Fixed bugs
bnc#1022263
VUL-1: CVE-2016-10166: gd,php5,php53,php7: potential unsigned underflow
bnc#1022264
VUL-1: CVE-2016-10167: gd,php5,php53,php7: DOS vulnerability in gdImageCreateFromGd2Ctx()
bnc#1022265
VUL-0: CVE-2016-10168: gd,php5,php53,php7: Signed Integer Overflow gd_io.c
bnc#1022284
VUL-0: CVE-2016-6912: gd: Double free vulnerability in the gdImageWebPtr via large width and height values
bnc#1022283
VUL-0: CVE-2016-9317: php5,php53,php7,gd: DoS via oversized image
bnc#1022553
VUL-1: CVE-2016-6906: gd: OOB reads of the TGA decompression buffer
Selected Binaries
openSUSE Build Service is sponsored by