MGASA-2016-0258

Source
https://advisories.mageia.org/MGASA-2016-0258.html
Import Source
https://advisories.mageia.org/MGASA-2016-0258.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0258
Related
Published
2016-07-26T19:11:30Z
Modified
2016-07-26T19:03:35Z
Summary
Updated libgd packages fix security vulnerability
Details

Updated libgd packages fix security vulnerabilities:

A read out-of-bounds was found in the parsing of TGA files when the header reports an incorrect size (CVE-2016-6132) or invalid bpp (CVE-2016-6214) or RLE value (upstream issue 248).

Integer overflow error within _gdContributionsAlloc() (CVE-2016-6207).

A regression in the previous update that caused some packages to fail to build against libgd has also been fixed (mga#18947).

References
Credits

Affected packages

Mageia:5 / libgd

Package

Name
libgd
Purl
pkg:rpm/mageia/libgd?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3-1.1.mga5

Ecosystem specific

{
    "section": "core"
}