FEDORA-2016-615f3bf06e

security update in Fedora 24 for gd

Status: stable 3 years ago

LibGD 2.2.3 release

Security related fixes: This flaw is caused by loading data from external sources (file, custom ctx, etc) and are hard to validate before calling libgd APIs:

  • fix php bug #72339, Integer Overflow in _gd2GetHeader (CVE-2016-5766)
  • bug #248, fix Out-Of-Bounds Read in read_image_tga

Using application provided parameters, in these cases invalid data causes the issues:

  • Integer overflow error within _gdContributionsAlloc() (CVE-2016-6207)
  • fix php bug #72494, invalid color index not handled, can lead to crash
  • improve color check for CropThreshold

Important update:

  • gdImageCopyResampled has been improved. Better handling of images with alpha channel, also brings libgd in sync with php's bundled gd.

This is a recommended update.

Comments 7

This update has been submitted for testing by remi.

This update has been pushed to testing.

works for me

karma: +1

This update has been submitted for stable by bodhi.

works for me

karma: +1

This update has been pushed to stable.

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
unspecified
Karma
+3
stable threshold: 3
unstable threshold: -3
Autopush (karma)
Enabled
Autopush (time)
Disabled
Dates
submitted 3 years ago
in testing 3 years ago
in stable 3 years ago

Related Bugs 4

00 #1351604 CVE-2016-6128 gd: Invalid color index not properly handled [fedora-all]
00 #1352548 CVE-2016-6132 gd: Buffer over-read issue when parsing crafted TGA file [fedora-all]
00 #1356467 CVE-2016-6214 gd: Buffer over-read issue when parsing crafted TGA file [fedora-all]
00 #1356486 gd: Out-of-bounds read in function read_image_tga in gd_tga.c [fedora-all]

Automated Test Results