-
libgd2 (2.1.0-3ubuntu0.11) trusty-security; urgency=medium
* SECURITY UPDATE: buffer overflow in gdImageColorMatch
- debian/patches/CVE-2019-6977.patch: use gdMaxColors in
src/gd_color_match.c.
- CVE-2019-6977
* SECURITY UPDATE: double-free in gdImage*Ptr() functions
- debian/patches/CVE-2019-6978.patch: properly handle failure in
src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
- CVE-2019-6978
-- Marc Deslauriers <email address hidden> Wed, 27 Feb 2019 14:42:23 -0500
-
libgd2 (2.1.0-3ubuntu0.10) trusty-security; urgency=medium
* SECURITY UPDATE: Double free
- debian/patches/CVE-2018-1000222.patch: fix in
src/gd_bmp.c.
- CVE-2018-1000222
* SECURITY UPDATE: Infinite loop
- debian/patches/CVE-2018-5711.patch: fix in
src/gd_gif_in.c.
- CVE-2018-5711
-- <email address hidden> (Leonidas S. Barbosa) Thu, 23 Aug 2018 10:51:28 -0300
-
libgd2 (2.1.0-3ubuntu0.8) trusty-security; urgency=medium
* SECURITY UPDATE: Double-free memory
- debian/patches/CVE-2017-6362.patch: introduces a static
helper to check failure or success in src/gd_png.c also
adds tests in tests/png/CMakeLists.txt, tests/Makemodule.am,
tests/png/bug00381_1.c, tests/png/bug00381_2.c.
- CVE-2017-6362
-- <email address hidden> (Leonidas S. Barbosa) Mon, 04 Sep 2017 18:55:20 -0300
-
libgd2 (2.1.0-3ubuntu0.7) trusty-security; urgency=medium
* SECURITY UPDATE: memory read vulnerability in GIF
- debian/patches/CVE-2017-7890.patch: zeroing buffers to avoid
information leak and adding test in src/gd_gif_in.c,
tests/gif/CMakeLists.txt, tests/MakeModule.am,
tests/gif/uninitialized_memory_read.c,
tests/gif/unitialized_memory_read.gif.
- CVE-2017-7890
-- <email address hidden> (Leonidas S. Barbosa) Thu, 10 Aug 2017 19:17:28 -0300
-
libgd2 (2.1.0-3ubuntu0.6) trusty-security; urgency=medium
* SECURITY UPDATE: potential unsigned underflow
- debian/patches/CVE-2016-10166.patch: refactor loop in
src/gd_interpolation.c.
- CVE-2016-10166
* SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
- debian/patches/CVE-2016-10167.patch: properly fail in src/gd_gd2.c.
- CVE-2016-10167
* SECURITY UPDATE: signed integer overflow in gd_io.c
- debian/patches/CVE-2016-10168.patch: check counts in src/gd_gd2.c.
- CVE-2016-10168
* SECURITY UPDATE: OOB reads of the TGA decompression buffer
- debian/patches/CVE-2016-6906-pre1.patch: fix coverty warning in
src/gd_tga.c.
- debian/patches/CVE-2016-6906-pre2.patch: fix TGA RLE decoding in
src/gd_tga.c.
- debian/patches/CVE-2016-6906-1.patch: check for overflow in
src/gd_tga.c.
- debian/patches/CVE-2016-6906-2.patch: add another overflow check in
src/gd_tga.c.
- CVE-2016-6906
* SECURITY UPDATE: double-free in gdImageWebPtr()
- debian/patches/CVE-2016-6912.patch: add helper function to indicate
failure in src/gd_webp.c.
- CVE-2016-6912
* SECURITY UPDATE: DoS via oversized image
- debian/patches/CVE-2016-9317.patch: check for oversized images in
src/gd.c.
- CVE-2016-9317
* SECURITY UPDATE: DoS via stack consumption
- debian/patches/CVE-2016-9933.patch: check for invalid colors in
src/gd.c.
- CVE-2016-9933
-- Marc Deslauriers <email address hidden> Tue, 28 Feb 2017 10:37:45 -0500
-
libgd2 (2.1.0-3ubuntu0.5) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service via invalid read in
gdImageCreateFromTiffPtr()
- debian/patches/CVE-2016-6911.patch: check out of bounds reads in
src/gd_io_dp.c, check return code in src/gd_tiff.c.
- CVE-2016-6911
* SECURITY UPDATE: denial of service and possible code execution via
integer overflow in gdImageWebpCtx
- debian/patches/CVE-2015-7568.patch: check for overflow in
src/gd_webp.c.
- CVE-2016-7568
* SECURITY UPDATE: stack buffer overflow in dynamicGetbuf
- debian/patches/CVE-2016-8670.patch: avoid potentially dangerous
signed to unsigned conversion in src/gd_io_dp.c.
- CVE-2016-8670
-- Marc Deslauriers <email address hidden> Tue, 18 Oct 2016 14:18:07 +0200
-
libgd2 (2.1.0-3ubuntu0.3) trusty-security; urgency=medium
* SECURITY UPDATE: out of bounds read in TGA file parsing
- debian/patches/CVE-2016-6132.patch: properly validate image data in
src/gd_tga.c.
- CVE-2016-6132
* SECURITY UPDATE: OOB or OOM in gdImageScale
- debian/patches/CVE-2016-6207.patch: check for overflows, use floats,
and check return codes in src/gd.c, src/gd_interpolation.c.
- CVE-2016-6207
* SECURITY UPDATE: out-of-bounds read issue with unsupported TGA
bpp/alphabit combinations
- debian/patches/CVE-2016-6214.patch: improve checks in src/gd_tga.c.
- CVE-2016-6214
-- Marc Deslauriers <email address hidden> Tue, 09 Aug 2016 09:51:31 -0400
-
libgd2 (2.1.0-3ubuntu0.2) trusty-security; urgency=medium
* SECURITY UPDATE: out of bounds read in gdImageScaleTwoPass
- debian/patches/CVE-2013-7456.patch: properly handle window size in
src/gd_interpolation.c.
- CVE-2013-7456
* SECURITY UPDATE: stack overflow with large names
- debian/patches/CVE-2016-5116.patch: properly handle names in
src/gd_xbm.c.
- CVE-2016-5116
* SECURITY UPDATE: integer overflow in _gd2GetHeader()
- debian/patches/CVE-2016-5766.patch: check for overflow in
src/gd_gd2.c.
- CVE-2016-5766
* SECURITY UPDATE: denial of service via invalid color index
- debian/patches/CVE-2016-6128.patch: check color index in
src/gd_crop.c, added test to tests/CMakeLists.txt, tests/Makefile.am,
tests/gdimagecrop/php_bug_72494.c.
- CVE-2016-6128
* SECURITY UPDATE: out of bounds read of masks array
- debian/patches/CVE-2016-6161.patch: properly handle EOF marker in
src/gd_gif_out.c.
- CVE-2016-6161
-- Marc Deslauriers <email address hidden> Fri, 08 Jul 2016 14:41:51 -0400
-
libgd2 (2.1.0-3ubuntu0.1) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service via crafted color table in XPM file
- debian/patches/CVE-2014-2497.patch: avoid null-pointer dereference in
src/gdxpm.c.
- CVE-2014-2497
* SECURITY UPDATE: denial of service via crafted GIF image
- debian/patches/CVE-2014-9709-1.patch: fix buffer read overflow in
src/gd_gif_in.c.
- debian/patches/CVE-2014-9709-2.patch: move overflow test outside the
loop in src/gd_gif_in.c.
- CVE-2014-9709
* SECURITY UPDATE: denial of service via crafted imagefilltoborder call
- debian/patches/CVE-2015-8874.patch: add limits to src/gd.c.
- CVE-2015-8874
* SECURITY UPDATE: denial of service via memleak in gdImageScaleTwoPass
- debian/patches/CVE-2015-8877.patch: use gdImageDestroy in
src/gd_interpolation.c.
- CVE-2015-8877
* SECURITY UPDATE: denial of service and possible code execution via
crafted compressed gd2 data
- debian/patches/CVE-2016-3074.patch: perform range checking in
src/gd_gd2.c.
- CVE-2016-3074
-- Marc Deslauriers <email address hidden> Thu, 26 May 2016 09:29:04 -0400
-
libgd2 (2.1.0-3) unstable; urgency=low
* Enable subdir-objects in AC_INIT_AUTOMAKE (Closes: #724841)
-- Ondřej Surý <email address hidden> Mon, 30 Sep 2013 11:10:16 +0200
-
libgd2 (2.1.0-2) unstable; urgency=low
* Properly quote GD_EXTRA_VERSIOn and GD_VERSION_STRING
(Courtesy of Marc Deslauriers) (Closes: #714363)
-- Ondřej Surý <email address hidden> Fri, 28 Jun 2013 15:44:28 +0200