File _patchinfo of Package patchinfo.4119
<patchinfo incident="4119">
<issue id="1022263" tracker="bnc">VUL-1: CVE-2016-10166: gd,php5,php53,php7: potential unsigned underflow</issue>
<issue id="1022264" tracker="bnc">VUL-1: CVE-2016-10167: gd,php5,php53,php7: DOS vulnerability in gdImageCreateFromGd2Ctx()</issue>
<issue id="1022265" tracker="bnc">VUL-0: CVE-2016-10168: gd,php5,php53,php7: Signed Integer Overflow gd_io.c</issue>
<issue id="1022284" tracker="bnc">VUL-0: CVE-2016-6912: gd: Double free vulnerability in the gdImageWebPtr via large width and height values</issue>
<issue id="1022283" tracker="bnc">VUL-0: CVE-2016-9317: php5,php53,php7,gd: DoS via oversized image</issue>
<issue id="1022553" tracker="bnc">VUL-1: CVE-2016-6906: gd: OOB reads of the TGA decompression buffer</issue>
<issue id="2016-9317" tracker="cve" />
<issue id="2016-6912" tracker="cve" />
<issue id="2016-6906" tracker="cve" />
<issue id="2016-10166" tracker="cve" />
<issue id="2016-10167" tracker="cve" />
<issue id="2016-10168" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>pgajdos</packager>
<description>
This update for gd fixes the following security issues:
- CVE-2016-6906: An out-of-bounds read in TGA decompression was fixed which could have lead to crashes. (bsc#1022553)
- CVE-2016-6912: Double free vulnerability in the gdImageWebPtr function
in the GD Graphics Library (aka libgd) allowed remote attackers to have
unspecified impact via large width and height values. (bsc#1022284)
- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
(aka libgd) allowed remote attackers to cause a denial of service
(system hang) via an oversized image. (bsc#1022283)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
functions could lead to memory corruption in the GD Graphics Library (aka libgd) (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
to memory corruption (bsc#1022265)
</description>
<summary>Security update for gd</summary>
</patchinfo>