File _patchinfo of Package patchinfo.2670
<patchinfo incident="2670">
<issue id="991436" tracker="bnc">VUL-0: CVE-2016-6214: gd: Buffer over-read issue when parsing crafted TGA file</issue>
<issue id="991622" tracker="bnc">VUL-0: CVE-2016-6207: gd: Integer overflow error within _gdContributionsAlloc()</issue>
<issue id="988032" tracker="bnc">VUL-1: CVE-2016-6161: php: global out of bounds read when encoding gif from malformed input withgd2togif</issue>
<issue id="987577" tracker="bnc">VUL-1: CVE-2016-6132: gd: read out-of-bands was found in the parsing of TGA files using libgd</issue>
<issue id="991710" tracker="bnc">VUL-1: CVE-2016-6128: gd: Invalid color index not properly handled</issue>
<issue id="982176" tracker="bnc">VUL-0: CVE-2016-5116: gd: avoid stack overflow (read) with large names</issue>
<issue id="995034" tracker="bnc">VUL-0: CVE-2016-6905: gd: Out-of-bounds read in function read_image_tga in gd_tga.c</issue>
<issue id="2016-6128" tracker="cve" />
<issue id="2016-6161" tracker="cve" />
<issue id="2016-6214" tracker="cve" />
<issue id="2016-6132" tracker="cve" />
<issue id="2016-5116" tracker="cve" />
<issue id="2016-6207" tracker="cve" />
<issue id="2016-6905" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>pgajdos</packager>
<description>
This update for gd fixes the following issues:
* CVE-2016-6214: Buffer over-read issue when parsing crafted TGA file [bsc#991436]
* CVE-2016-6132: read out-of-bands was found in the parsing of TGA files using libgd [bsc#987577]
* CVE-2016-6128: Invalid color index not properly handled [bsc#991710]
* CVE-2016-6207: Integer overflow error within _gdContributionsAlloc() [bsc#991622]
* CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]
* CVE-2016-5116: avoid stack overflow (read) with large names [bsc#982176]
* CVE-2016-6905: Out-of-bounds read in function read_image_tga in gd_tga.c [bsc#995034]
</description>
<summary>Security update for gd</summary>
</patchinfo>