Bug 1352544 (CVE-2016-6132) - CVE-2016-6132 gd: Buffer over-read issue when parsing crafted TGA file
Summary: CVE-2016-6132 gd: Buffer over-read issue when parsing crafted TGA file
Alias: CVE-2016-6132
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1352548
Blocks: 1352552
TreeView+ depends on / blocked
Reported: 2016-07-04 10:05 UTC by Adam Mariš
Modified: 2019-09-29 13:52 UTC (History)
19 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2016-07-06 04:44:00 UTC

Attachments (Terms of Use)

Description Adam Mariš 2016-07-04 10:05:48 UTC
An out-of-bounds heap read vulnerability was found in latest revision of libgd (a6a0e7f) when parsing specially crafted TARGA file.

Upstream bug:


CVE assignment:


Comment 1 Adam Mariš 2016-07-04 10:09:25 UTC
Created gd tracking bugs for this issue:

Affects: fedora-all [bug 1352548]

Comment 2 Doran Moppert 2016-07-06 04:43:20 UTC
gd releases prior to 2.1 did not include .TGA format support and so are not affected by this flaw.

This includes RHEL 5,6,7 and Openshift packages.

Note that the git repository's tag history is misleading in this respect - examine SRPMs to verify.

Comment 3 Doran Moppert 2016-07-07 02:12:15 UTC
confirmed packages embedding gd including RHSCL variants are not affected, for the same reason as rhel-*/gd

Note You need to log in before you can comment on or make changes to this bug.