libgd2 (2.1.1-4ubuntu0.16.04.5) xenial-security; urgency=medium
* SECURITY UPDATE: denial of service via invalid read in
gdImageCreateFromTiffPtr()
- debian/patches/CVE-2016-6911.patch: check out of bounds reads in
src/gd_io_dp.c, check return code in src/gd_tiff.c.
- CVE-2016-6911
* SECURITY UPDATE: denial of service and possible code execution via
integer overflow in gdImageWebpCtx
- debian/patches/CVE-2015-7568.patch: check for overflow in
src/gd_webp.c.
- CVE-2016-7568
* SECURITY UPDATE: stack buffer overflow in dynamicGetbuf
- debian/patches/CVE-2016-8670.patch: avoid potentially dangerous
signed to unsigned conversion in src/gd_io_dp.c.
- CVE-2016-8670
Date: 2016-10-18 13:04:29.898026+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
Signed-By: Ubuntu Archive Robot
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/libgd2/2.1.1-4ubuntu0.16.04.5
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes