Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12:Update
patchinfo.4119
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.4119
<patchinfo incident="4119"> <issue id="1022263" tracker="bnc">VUL-1: CVE-2016-10166: gd,php5,php53,php7: potential unsigned underflow</issue> <issue id="1022264" tracker="bnc">VUL-1: CVE-2016-10167: gd,php5,php53,php7: DOS vulnerability in gdImageCreateFromGd2Ctx()</issue> <issue id="1022265" tracker="bnc">VUL-0: CVE-2016-10168: gd,php5,php53,php7: Signed Integer Overflow gd_io.c</issue> <issue id="1022284" tracker="bnc">VUL-0: CVE-2016-6912: gd: Double free vulnerability in the gdImageWebPtr via large width and height values</issue> <issue id="1022283" tracker="bnc">VUL-0: CVE-2016-9317: php5,php53,php7,gd: DoS via oversized image</issue> <issue id="1022553" tracker="bnc">VUL-1: CVE-2016-6906: gd: OOB reads of the TGA decompression buffer</issue> <issue id="2016-9317" tracker="cve" /> <issue id="2016-6912" tracker="cve" /> <issue id="2016-6906" tracker="cve" /> <issue id="2016-10166" tracker="cve" /> <issue id="2016-10167" tracker="cve" /> <issue id="2016-10168" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>pgajdos</packager> <description> This update for gd fixes the following security issues: - CVE-2016-6906: An out-of-bounds read in TGA decompression was fixed which could have lead to crashes. (bsc#1022553) - CVE-2016-6912: Double free vulnerability in the gdImageWebPtr function in the GD Graphics Library (aka libgd) allowed remote attackers to have unspecified impact via large width and height values. (bsc#1022284) - CVE-2016-9317: The gdImageCreate function in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (system hang) via an oversized image. (bsc#1022283) - CVE-2016-10166: A potential unsigned underflow in gd interpolation functions could lead to memory corruption in the GD Graphics Library (aka libgd) (bsc#1022263) - CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx() could lead to libgd running out of memory even on small files. (bsc#1022264) - CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead to memory corruption (bsc#1022265) </description> <summary>Security update for gd</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor