View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/libgd2
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/debian/dsc 2019-09-07 17:58:04 UTC 2019-09-07
DSC file for 2.2.4-2+deb9u5

Author: Ubuntu Git Importer
Author Date: 2019-09-07 17:58:04 UTC

DSC file for 2.2.4-2+deb9u5

debian/stretch 2019-09-07 17:52:10 UTC 2019-09-07
Import patches-unapplied version 2.2.4-2+deb9u5 to debian/stretch

Author: mejo
Author Date: 2019-06-11 15:33:42 UTC

Import patches-unapplied version 2.2.4-2+deb9u5 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: 0c033ed3e44435a571d20e6c87d0f8c999cc7969

New changelog entries:
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/debian/stretch 2019-09-07 17:52:10 UTC 2019-09-07
Import patches-applied version 2.2.4-2+deb9u5 to applied/debian/stretch

Author: mejo
Author Date: 2019-06-11 15:33:42 UTC

Import patches-applied version 2.2.4-2+deb9u5 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: a91ed0fc78470c71883b6a1d6e883f6e021480b9
Unapplied parent: cd12b28b1d05a6843c76fc505af575821b021210

New changelog entries:
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

importer/ubuntu/dsc 2019-06-12 23:42:19 UTC 2019-06-12
DSC file for 2.2.5-5.2

Author: Ubuntu Git Importer
Author Date: 2019-06-12 23:42:19 UTC

DSC file for 2.2.5-5.2

ubuntu/eoan-devel 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-unapplied version 2.2.5-5.2 to debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-unapplied version 2.2.5-5.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d8fe26e9f8d5113e4d6a6782e51dc59bc4f46a0c

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

ubuntu/focal 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-unapplied version 2.2.5-5.2 to debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-unapplied version 2.2.5-5.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d8fe26e9f8d5113e4d6a6782e51dc59bc4f46a0c

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

ubuntu/eoan 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-unapplied version 2.2.5-5.2 to debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-unapplied version 2.2.5-5.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d8fe26e9f8d5113e4d6a6782e51dc59bc4f46a0c

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/ubuntu/eoan 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 307ce18cf1b5b4205dbd5492ded3f2621de835b1
Unapplied parent: 91ad7ed18a0355d25327be3fbadc8d8e058f4992

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/ubuntu/focal 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 307ce18cf1b5b4205dbd5492ded3f2621de835b1
Unapplied parent: 91ad7ed18a0355d25327be3fbadc8d8e058f4992

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

debian/sid 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-unapplied version 2.2.5-5.2 to debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-unapplied version 2.2.5-5.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d8fe26e9f8d5113e4d6a6782e51dc59bc4f46a0c

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/debian/buster 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 307ce18cf1b5b4205dbd5492ded3f2621de835b1
Unapplied parent: 91ad7ed18a0355d25327be3fbadc8d8e058f4992

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

debian/buster 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-unapplied version 2.2.5-5.2 to debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-unapplied version 2.2.5-5.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d8fe26e9f8d5113e4d6a6782e51dc59bc4f46a0c

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/ubuntu/devel 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 307ce18cf1b5b4205dbd5492ded3f2621de835b1
Unapplied parent: 91ad7ed18a0355d25327be3fbadc8d8e058f4992

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

ubuntu/devel 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-unapplied version 2.2.5-5.2 to debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-unapplied version 2.2.5-5.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d8fe26e9f8d5113e4d6a6782e51dc59bc4f46a0c

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/ubuntu/focal-devel 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 307ce18cf1b5b4205dbd5492ded3f2621de835b1
Unapplied parent: 91ad7ed18a0355d25327be3fbadc8d8e058f4992

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/ubuntu/eoan-devel 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 307ce18cf1b5b4205dbd5492ded3f2621de835b1
Unapplied parent: 91ad7ed18a0355d25327be3fbadc8d8e058f4992

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/debian/sid 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 307ce18cf1b5b4205dbd5492ded3f2621de835b1
Unapplied parent: 91ad7ed18a0355d25327be3fbadc8d8e058f4992

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

ubuntu/focal-devel 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-unapplied version 2.2.5-5.2 to debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-unapplied version 2.2.5-5.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d8fe26e9f8d5113e4d6a6782e51dc59bc4f46a0c

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/ubuntu/eoan-proposed 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-applied version 2.2.5-5.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 307ce18cf1b5b4205dbd5492ded3f2621de835b1
Unapplied parent: 91ad7ed18a0355d25327be3fbadc8d8e058f4992

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

ubuntu/eoan-proposed 2019-06-12 22:32:27 UTC 2019-06-12
Import patches-unapplied version 2.2.5-5.2 to debian/sid

Author: mejo
Author Date: 2019-06-11 14:21:57 UTC

Import patches-unapplied version 2.2.5-5.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d8fe26e9f8d5113e4d6a6782e51dc59bc4f46a0c

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2019-11038: Uninitialized read in gdImageCreateFromXbm
    (Closes: #929821)

applied/ubuntu/cosmic-devel 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.2.5-4ubuntu1.1 to applied/ubuntu/cosmic-secu...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:26:43 UTC

Import patches-applied version 2.2.5-4ubuntu1.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 48c0377a8f3305c7efe796cca8d7ac61d71008df
Unapplied parent: bd2388e76fcff926aafedaad81238a1a30c44dec

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/xenial-devel 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.1.1-4ubuntu0.16.04.11 to applied/ubuntu/xeni...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:35:55 UTC

Import patches-applied version 2.1.1-4ubuntu0.16.04.11 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: aa5d0a298f938dafb1d95e2c31084d745f4aea89
Unapplied parent: 0ed15dfd96c1eadf009c2515a4461d20d532f09c

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/xenial-devel 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.1.1-4ubuntu0.16.04.11 to ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:35:55 UTC

Import patches-unapplied version 2.1.1-4ubuntu0.16.04.11 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 13876a7d19c3e3344c7f18ca18ef1aaaa373dcc9

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/trusty-security 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.1.0-3ubuntu0.11 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:42:23 UTC

Import patches-applied version 2.1.0-3ubuntu0.11 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 776bfa79d30c048b8e1aa76ef11b54794e1cc513
Unapplied parent: 82fd335a14b02b3057f582b0275b43b987280d53

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/bionic-devel 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.2.5-4ubuntu0.3 to applied/ubuntu/bionic-secu...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:31:55 UTC

Import patches-applied version 2.2.5-4ubuntu0.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 59fe22dbbbe4356d1cae98a4bd6a06ad43db45d1
Unapplied parent: f2383a73d2e1e49e63f41c09d39665bda91d28b7

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/xenial-updates 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.1.1-4ubuntu0.16.04.11 to ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:35:55 UTC

Import patches-unapplied version 2.1.1-4ubuntu0.16.04.11 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 13876a7d19c3e3344c7f18ca18ef1aaaa373dcc9

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/cosmic-updates 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.2.5-4ubuntu1.1 to applied/ubuntu/cosmic-secu...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:26:43 UTC

Import patches-applied version 2.2.5-4ubuntu1.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 48c0377a8f3305c7efe796cca8d7ac61d71008df
Unapplied parent: bd2388e76fcff926aafedaad81238a1a30c44dec

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/bionic-devel 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.2.5-4ubuntu0.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-02-27 19:31:55 UTC

Import patches-unapplied version 2.2.5-4ubuntu0.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 45e1fecd2473f43e5327dbf9391342518d219e0d

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/cosmic-security 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.2.5-4ubuntu1.1 to applied/ubuntu/cosmic-secu...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:26:43 UTC

Import patches-applied version 2.2.5-4ubuntu1.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 48c0377a8f3305c7efe796cca8d7ac61d71008df
Unapplied parent: bd2388e76fcff926aafedaad81238a1a30c44dec

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/bionic-security 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.2.5-4ubuntu0.3 to applied/ubuntu/bionic-secu...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:31:55 UTC

Import patches-applied version 2.2.5-4ubuntu0.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 59fe22dbbbe4356d1cae98a4bd6a06ad43db45d1
Unapplied parent: f2383a73d2e1e49e63f41c09d39665bda91d28b7

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/trusty-security 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.1.0-3ubuntu0.11 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-02-27 19:42:23 UTC

Import patches-unapplied version 2.1.0-3ubuntu0.11 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 97da2d5f2e8292088692fde7fcc196c390395a30

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/bionic-security 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.2.5-4ubuntu0.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-02-27 19:31:55 UTC

Import patches-unapplied version 2.2.5-4ubuntu0.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 45e1fecd2473f43e5327dbf9391342518d219e0d

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/trusty-devel 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.1.0-3ubuntu0.11 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-02-27 19:42:23 UTC

Import patches-unapplied version 2.1.0-3ubuntu0.11 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 97da2d5f2e8292088692fde7fcc196c390395a30

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/trusty-devel 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.1.0-3ubuntu0.11 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:42:23 UTC

Import patches-applied version 2.1.0-3ubuntu0.11 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 776bfa79d30c048b8e1aa76ef11b54794e1cc513
Unapplied parent: 82fd335a14b02b3057f582b0275b43b987280d53

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/cosmic-devel 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.2.5-4ubuntu1.1 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-02-27 19:26:43 UTC

Import patches-unapplied version 2.2.5-4ubuntu1.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: f8b9ac45ece56d5e37123ef7f15330f1c4730c91

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/cosmic-updates 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.2.5-4ubuntu1.1 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-02-27 19:26:43 UTC

Import patches-unapplied version 2.2.5-4ubuntu1.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: f8b9ac45ece56d5e37123ef7f15330f1c4730c91

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/bionic-updates 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.2.5-4ubuntu0.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-02-27 19:31:55 UTC

Import patches-unapplied version 2.2.5-4ubuntu0.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 45e1fecd2473f43e5327dbf9391342518d219e0d

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/xenial-security 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.1.1-4ubuntu0.16.04.11 to ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:35:55 UTC

Import patches-unapplied version 2.1.1-4ubuntu0.16.04.11 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 13876a7d19c3e3344c7f18ca18ef1aaaa373dcc9

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/xenial-security 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.1.1-4ubuntu0.16.04.11 to applied/ubuntu/xeni...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:35:55 UTC

Import patches-applied version 2.1.1-4ubuntu0.16.04.11 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: aa5d0a298f938dafb1d95e2c31084d745f4aea89
Unapplied parent: 0ed15dfd96c1eadf009c2515a4461d20d532f09c

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/bionic-updates 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.2.5-4ubuntu0.3 to applied/ubuntu/bionic-secu...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:31:55 UTC

Import patches-applied version 2.2.5-4ubuntu0.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 59fe22dbbbe4356d1cae98a4bd6a06ad43db45d1
Unapplied parent: f2383a73d2e1e49e63f41c09d39665bda91d28b7

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/trusty-updates 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.1.0-3ubuntu0.11 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:42:23 UTC

Import patches-applied version 2.1.0-3ubuntu0.11 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 776bfa79d30c048b8e1aa76ef11b54794e1cc513
Unapplied parent: 82fd335a14b02b3057f582b0275b43b987280d53

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/xenial-updates 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-applied version 2.1.1-4ubuntu0.16.04.11 to applied/ubuntu/xeni...

Author: Marc Deslauriers
Author Date: 2019-02-27 19:35:55 UTC

Import patches-applied version 2.1.1-4ubuntu0.16.04.11 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: aa5d0a298f938dafb1d95e2c31084d745f4aea89
Unapplied parent: 0ed15dfd96c1eadf009c2515a4461d20d532f09c

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/trusty-updates 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.1.0-3ubuntu0.11 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-02-27 19:42:23 UTC

Import patches-unapplied version 2.1.0-3ubuntu0.11 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 97da2d5f2e8292088692fde7fcc196c390395a30

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

ubuntu/cosmic-security 2019-02-28 14:03:13 UTC 2019-02-28
Import patches-unapplied version 2.2.5-4ubuntu1.1 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-02-27 19:26:43 UTC

Import patches-unapplied version 2.2.5-4ubuntu1.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: f8b9ac45ece56d5e37123ef7f15330f1c4730c91

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gdImageColorMatch
    - debian/patches/CVE-2019-6977.patch: use gdMaxColors in
      src/gd_color_match.c.
    - CVE-2019-6977
  * SECURITY UPDATE: double-free in gdImage*Ptr() functions
    - debian/patches/CVE-2019-6978.patch: properly handle failure in
      src/gd_gif_out.c, src/gd_jpeg.c, src/gd_wbmp.c, add test to
      tests/jpeg/CMakeLists.txt, tests/jpeg/Makemodule.am,
      tests/jpeg/jpeg_ptr_double_free.c.
    - CVE-2019-6978

applied/ubuntu/disco-devel 2019-02-07 04:34:37 UTC 2019-02-07
Import patches-applied version 2.2.5-5.1 to applied/debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-02-02 09:55:00 UTC

Import patches-applied version 2.2.5-5.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 8582597a6386961939af4797895c8ae56c277fa1
Unapplied parent: 73844b1249beb3d240fbf8f664ab98f8fefba254

New changelog entries:
  * Non-maintainer upload.
  * Heap-based buffer overflow in gdImageColorMatch (CVE-2019-6977)
    (Closes: #920645)
  * Potential double-free in gdImage*Ptr() (CVE-2019-6978) (Closes: #920728)

applied/ubuntu/disco 2019-02-07 04:34:37 UTC 2019-02-07
Import patches-applied version 2.2.5-5.1 to applied/debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-02-02 09:55:00 UTC

Import patches-applied version 2.2.5-5.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 8582597a6386961939af4797895c8ae56c277fa1
Unapplied parent: 73844b1249beb3d240fbf8f664ab98f8fefba254

New changelog entries:
  * Non-maintainer upload.
  * Heap-based buffer overflow in gdImageColorMatch (CVE-2019-6977)
    (Closes: #920645)
  * Potential double-free in gdImage*Ptr() (CVE-2019-6978) (Closes: #920728)

ubuntu/disco 2019-02-07 04:34:37 UTC 2019-02-07
Import patches-unapplied version 2.2.5-5.1 to debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-02-02 09:55:00 UTC

Import patches-unapplied version 2.2.5-5.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 3bba9dcc903c1b1a0b5b2f235882e767a7122a37

New changelog entries:
  * Non-maintainer upload.
  * Heap-based buffer overflow in gdImageColorMatch (CVE-2019-6977)
    (Closes: #920645)
  * Potential double-free in gdImage*Ptr() (CVE-2019-6978) (Closes: #920728)

ubuntu/disco-devel 2019-02-07 04:34:37 UTC 2019-02-07
Import patches-unapplied version 2.2.5-5.1 to debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-02-02 09:55:00 UTC

Import patches-unapplied version 2.2.5-5.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 3bba9dcc903c1b1a0b5b2f235882e767a7122a37

New changelog entries:
  * Non-maintainer upload.
  * Heap-based buffer overflow in gdImageColorMatch (CVE-2019-6977)
    (Closes: #920645)
  * Potential double-free in gdImage*Ptr() (CVE-2019-6978) (Closes: #920728)

ubuntu/disco-proposed 2019-02-07 04:34:37 UTC 2019-02-07
Import patches-unapplied version 2.2.5-5.1 to debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-02-02 09:55:00 UTC

Import patches-unapplied version 2.2.5-5.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 3bba9dcc903c1b1a0b5b2f235882e767a7122a37

New changelog entries:
  * Non-maintainer upload.
  * Heap-based buffer overflow in gdImageColorMatch (CVE-2019-6977)
    (Closes: #920645)
  * Potential double-free in gdImage*Ptr() (CVE-2019-6978) (Closes: #920728)

applied/ubuntu/disco-proposed 2019-02-07 04:34:37 UTC 2019-02-07
Import patches-applied version 2.2.5-5.1 to applied/debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-02-02 09:55:00 UTC

Import patches-applied version 2.2.5-5.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 8582597a6386961939af4797895c8ae56c277fa1
Unapplied parent: 73844b1249beb3d240fbf8f664ab98f8fefba254

New changelog entries:
  * Non-maintainer upload.
  * Heap-based buffer overflow in gdImageColorMatch (CVE-2019-6977)
    (Closes: #920645)
  * Potential double-free in gdImage*Ptr() (CVE-2019-6978) (Closes: #920728)

applied/ubuntu/cosmic-proposed 2018-09-10 20:05:32 UTC 2018-09-10
Import patches-applied version 2.2.5-4ubuntu1 to applied/ubuntu/cosmic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-09-10 16:12:09 UTC

Import patches-applied version 2.2.5-4ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 7e59de821e93263f57c64c6e446fb7dc48d0f0e0
Unapplied parent: 0b8c1b95aa9ea411c29168ad94bd4594843fbb03

New changelog entries:
  * SECURITY UPDATE: Double free
    - debian/patches/CVE-2018-1000222.patch: fix in
      src/gd_bmp.c.
    - CVE-2018-1000222
  * SECURITY UPDATE: Infinite loop
    - debian/patches/CVE-2018-5711.patch: fix in
      src/gd_gif_in.c.
    - CVE-2018-5711
  * Removing flag -lgd from tests-make-a-little-change*
    patch.

applied/ubuntu/cosmic 2018-09-10 20:05:32 UTC 2018-09-10
Import patches-applied version 2.2.5-4ubuntu1 to applied/ubuntu/cosmic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-09-10 16:12:09 UTC

Import patches-applied version 2.2.5-4ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 7e59de821e93263f57c64c6e446fb7dc48d0f0e0
Unapplied parent: 0b8c1b95aa9ea411c29168ad94bd4594843fbb03

New changelog entries:
  * SECURITY UPDATE: Double free
    - debian/patches/CVE-2018-1000222.patch: fix in
      src/gd_bmp.c.
    - CVE-2018-1000222
  * SECURITY UPDATE: Infinite loop
    - debian/patches/CVE-2018-5711.patch: fix in
      src/gd_gif_in.c.
    - CVE-2018-5711
  * Removing flag -lgd from tests-make-a-little-change*
    patch.

ubuntu/cosmic 2018-09-10 20:05:32 UTC 2018-09-10
Import patches-unapplied version 2.2.5-4ubuntu1 to ubuntu/cosmic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-09-10 16:12:09 UTC

Import patches-unapplied version 2.2.5-4ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 08fc8b019a08c4b04a7d4692e19538964812faa4

New changelog entries:
  * SECURITY UPDATE: Double free
    - debian/patches/CVE-2018-1000222.patch: fix in
      src/gd_bmp.c.
    - CVE-2018-1000222
  * SECURITY UPDATE: Infinite loop
    - debian/patches/CVE-2018-5711.patch: fix in
      src/gd_gif_in.c.
    - CVE-2018-5711
  * Removing flag -lgd from tests-make-a-little-change*
    patch.

ubuntu/cosmic-proposed 2018-09-10 20:05:32 UTC 2018-09-10
Import patches-unapplied version 2.2.5-4ubuntu1 to ubuntu/cosmic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-09-10 16:12:09 UTC

Import patches-unapplied version 2.2.5-4ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 08fc8b019a08c4b04a7d4692e19538964812faa4

New changelog entries:
  * SECURITY UPDATE: Double free
    - debian/patches/CVE-2018-1000222.patch: fix in
      src/gd_bmp.c.
    - CVE-2018-1000222
  * SECURITY UPDATE: Infinite loop
    - debian/patches/CVE-2018-5711.patch: fix in
      src/gd_gif_in.c.
    - CVE-2018-5711
  * Removing flag -lgd from tests-make-a-little-change*
    patch.

importer/ubuntu/pristine-tar 2018-03-28 07:52:14 UTC 2018-03-28
pristine-tar data for libgd2_2.2.5.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-03-28 07:52:14 UTC

pristine-tar data for libgd2_2.2.5.orig.tar.gz

importer/debian/pristine-tar 2018-03-28 07:23:16 UTC 2018-03-28
pristine-tar data for libgd2_2.2.5.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-03-28 07:23:16 UTC

pristine-tar data for libgd2_2.2.5.orig.tar.gz

debian/jessie 2017-12-09 17:45:29 UTC 2017-12-09
Import patches-unapplied version 2.1.0-5+deb8u11 to debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2017-08-31 12:31:50 UTC

Import patches-unapplied version 2.1.0-5+deb8u11 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 9c3e81868817a64b1b7c59c145076d058fdc992c

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * CVE-2017-6362: Double-free in gdImagePngPtr()
  * Non-maintainer upload by the Security Team.
  * CVE-2017-7890: Fix unitialized memory read vulnerability in GIF reading
    (Closes: #869263)

applied/debian/jessie 2017-12-09 17:45:29 UTC 2017-12-09
Import patches-applied version 2.1.0-5+deb8u11 to applied/debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2017-08-31 12:31:50 UTC

Import patches-applied version 2.1.0-5+deb8u11 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: 15bdd815901817587c4048742d5d29af5b36c0f7
Unapplied parent: 21afa5e35bea0a1feedc336b3e77b9df61559870

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * CVE-2017-6362: Double-free in gdImagePngPtr()
  * Non-maintainer upload by the Security Team.
  * CVE-2017-7890: Fix unitialized memory read vulnerability in GIF reading
    (Closes: #869263)

ubuntu/bionic 2017-10-22 16:33:25 UTC 2017-10-22
Import patches-unapplied version 2.2.5-4 to debian/sid

Author: Ondřej Surý
Author Date: 2017-10-22 09:14:32 UTC

Import patches-unapplied version 2.2.5-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 65200a64b16f53f23e9610cfb5eb26048d68d7d6

New changelog entries:
  [ Jiří Paleček ]
  * Disable the test during build and run the testsuite through autopkgtest
    (Closes: #867003)
  * Make --as-needed work again
  [ Ondřej Surý ]
  * Get rid of libgd2*-dev traces (Closes: #879254)

ubuntu/bionic-proposed 2017-10-22 16:33:25 UTC 2017-10-22
Import patches-unapplied version 2.2.5-4 to debian/sid

Author: Ondřej Surý
Author Date: 2017-10-22 09:14:32 UTC

Import patches-unapplied version 2.2.5-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 65200a64b16f53f23e9610cfb5eb26048d68d7d6

New changelog entries:
  [ Jiří Paleček ]
  * Disable the test during build and run the testsuite through autopkgtest
    (Closes: #867003)
  * Make --as-needed work again
  [ Ondřej Surý ]
  * Get rid of libgd2*-dev traces (Closes: #879254)

applied/ubuntu/bionic-proposed 2017-10-22 16:33:25 UTC 2017-10-22
Import patches-applied version 2.2.5-4 to applied/debian/sid

Author: Ondřej Surý
Author Date: 2017-10-22 09:14:32 UTC

Import patches-applied version 2.2.5-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ffce56971a614f75f9a0d98be890abaca4684d1c
Unapplied parent: 7f5228532705c6278f0f140bc1e9e76224862820

New changelog entries:
  [ Jiří Paleček ]
  * Disable the test during build and run the testsuite through autopkgtest
    (Closes: #867003)
  * Make --as-needed work again
  [ Ondřej Surý ]
  * Get rid of libgd2*-dev traces (Closes: #879254)

applied/ubuntu/bionic 2017-10-22 16:33:25 UTC 2017-10-22
Import patches-applied version 2.2.5-4 to applied/debian/sid

Author: Ondřej Surý
Author Date: 2017-10-22 09:14:32 UTC

Import patches-applied version 2.2.5-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ffce56971a614f75f9a0d98be890abaca4684d1c
Unapplied parent: 7f5228532705c6278f0f140bc1e9e76224862820

New changelog entries:
  [ Jiří Paleček ]
  * Disable the test during build and run the testsuite through autopkgtest
    (Closes: #867003)
  * Make --as-needed work again
  [ Ondřej Surý ]
  * Get rid of libgd2*-dev traces (Closes: #879254)

ubuntu/artful-proposed 2017-09-18 16:32:32 UTC 2017-09-18
Import patches-unapplied version 2.2.5-3 to debian/sid

Author: Ondřej Surý
Author Date: 2017-09-05 11:46:57 UTC

Import patches-unapplied version 2.2.5-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 3baa7b0551efb5a2a07533de22c9b7684fb3f52a

New changelog entries:
  * Disable gdimagerotate/bug00067 because it FTBFS on i386

ubuntu/artful 2017-09-18 16:32:32 UTC 2017-09-18
Import patches-unapplied version 2.2.5-3 to debian/sid

Author: Ondřej Surý
Author Date: 2017-09-05 11:46:57 UTC

Import patches-unapplied version 2.2.5-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 3baa7b0551efb5a2a07533de22c9b7684fb3f52a

New changelog entries:
  * Disable gdimagerotate/bug00067 because it FTBFS on i386

ubuntu/artful-devel 2017-09-18 16:32:32 UTC 2017-09-18
Import patches-unapplied version 2.2.5-3 to debian/sid

Author: Ondřej Surý
Author Date: 2017-09-05 11:46:57 UTC

Import patches-unapplied version 2.2.5-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 3baa7b0551efb5a2a07533de22c9b7684fb3f52a

New changelog entries:
  * Disable gdimagerotate/bug00067 because it FTBFS on i386

applied/ubuntu/artful-proposed 2017-09-18 16:32:32 UTC 2017-09-18
Import patches-applied version 2.2.5-3 to applied/debian/sid

Author: Ondřej Surý
Author Date: 2017-09-05 11:46:57 UTC

Import patches-applied version 2.2.5-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 77886f0c14f775fd9c1320e57e69eca31b2679ca
Unapplied parent: ca78ca79f447977a16079f59ac2f854a36a6dbe2

New changelog entries:
  * Disable gdimagerotate/bug00067 because it FTBFS on i386

applied/ubuntu/artful-devel 2017-09-18 16:32:32 UTC 2017-09-18
Import patches-applied version 2.2.5-3 to applied/debian/sid

Author: Ondřej Surý
Author Date: 2017-09-05 11:46:57 UTC

Import patches-applied version 2.2.5-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 77886f0c14f775fd9c1320e57e69eca31b2679ca
Unapplied parent: ca78ca79f447977a16079f59ac2f854a36a6dbe2

New changelog entries:
  * Disable gdimagerotate/bug00067 because it FTBFS on i386

applied/ubuntu/artful 2017-09-18 16:32:32 UTC 2017-09-18
Import patches-applied version 2.2.5-3 to applied/debian/sid

Author: Ondřej Surý
Author Date: 2017-09-05 11:46:57 UTC

Import patches-applied version 2.2.5-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 77886f0c14f775fd9c1320e57e69eca31b2679ca
Unapplied parent: ca78ca79f447977a16079f59ac2f854a36a6dbe2

New changelog entries:
  * Disable gdimagerotate/bug00067 because it FTBFS on i386

ubuntu/zesty-devel 2017-09-05 16:18:29 UTC 2017-09-05
Import patches-unapplied version 2.2.4-2ubuntu0.3 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-09-04 17:03:54 UTC

Import patches-unapplied version 2.2.4-2ubuntu0.3 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 01c0660ea83d07a1a5d1841a2b129e0fa5753f8d

New changelog entries:
  * SECURITY UPDATE: Double-free memory
    - debian/patches/CVE-2017-6362.patch: introduces a static
      helper to check failure or success in src/gd_png.c also
      adds tests in tests/png/CMakeLists.txt, tests/png/Makemodule.am,
      tests/png/bug00381_1.c, tests/png/bug00381_2.c.
    - CVE-2017-6362

applied/ubuntu/zesty-updates 2017-09-05 16:18:29 UTC 2017-09-05
Import patches-applied version 2.2.4-2ubuntu0.3 to applied/ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-09-04 17:03:54 UTC

Import patches-applied version 2.2.4-2ubuntu0.3 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 42e05b23f5b375d1764ffc88e317941a3658ad48
Unapplied parent: b523653fd63a3f9d3a7b182211b3c8b7a9becbcd

New changelog entries:
  * SECURITY UPDATE: Double-free memory
    - debian/patches/CVE-2017-6362.patch: introduces a static
      helper to check failure or success in src/gd_png.c also
      adds tests in tests/png/CMakeLists.txt, tests/png/Makemodule.am,
      tests/png/bug00381_1.c, tests/png/bug00381_2.c.
    - CVE-2017-6362

applied/ubuntu/zesty-security 2017-09-05 16:18:29 UTC 2017-09-05
Import patches-applied version 2.2.4-2ubuntu0.3 to applied/ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-09-04 17:03:54 UTC

Import patches-applied version 2.2.4-2ubuntu0.3 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 42e05b23f5b375d1764ffc88e317941a3658ad48
Unapplied parent: b523653fd63a3f9d3a7b182211b3c8b7a9becbcd

New changelog entries:
  * SECURITY UPDATE: Double-free memory
    - debian/patches/CVE-2017-6362.patch: introduces a static
      helper to check failure or success in src/gd_png.c also
      adds tests in tests/png/CMakeLists.txt, tests/png/Makemodule.am,
      tests/png/bug00381_1.c, tests/png/bug00381_2.c.
    - CVE-2017-6362

applied/ubuntu/zesty-devel 2017-09-05 16:18:29 UTC 2017-09-05
Import patches-applied version 2.2.4-2ubuntu0.3 to applied/ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-09-04 17:03:54 UTC

Import patches-applied version 2.2.4-2ubuntu0.3 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 42e05b23f5b375d1764ffc88e317941a3658ad48
Unapplied parent: b523653fd63a3f9d3a7b182211b3c8b7a9becbcd

New changelog entries:
  * SECURITY UPDATE: Double-free memory
    - debian/patches/CVE-2017-6362.patch: introduces a static
      helper to check failure or success in src/gd_png.c also
      adds tests in tests/png/CMakeLists.txt, tests/png/Makemodule.am,
      tests/png/bug00381_1.c, tests/png/bug00381_2.c.
    - CVE-2017-6362

ubuntu/zesty-security 2017-09-05 16:18:29 UTC 2017-09-05
Import patches-unapplied version 2.2.4-2ubuntu0.3 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-09-04 17:03:54 UTC

Import patches-unapplied version 2.2.4-2ubuntu0.3 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 01c0660ea83d07a1a5d1841a2b129e0fa5753f8d

New changelog entries:
  * SECURITY UPDATE: Double-free memory
    - debian/patches/CVE-2017-6362.patch: introduces a static
      helper to check failure or success in src/gd_png.c also
      adds tests in tests/png/CMakeLists.txt, tests/png/Makemodule.am,
      tests/png/bug00381_1.c, tests/png/bug00381_2.c.
    - CVE-2017-6362

ubuntu/zesty-updates 2017-09-05 16:18:29 UTC 2017-09-05
Import patches-unapplied version 2.2.4-2ubuntu0.3 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-09-04 17:03:54 UTC

Import patches-unapplied version 2.2.4-2ubuntu0.3 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 01c0660ea83d07a1a5d1841a2b129e0fa5753f8d

New changelog entries:
  * SECURITY UPDATE: Double-free memory
    - debian/patches/CVE-2017-6362.patch: introduces a static
      helper to check failure or success in src/gd_png.c also
      adds tests in tests/png/CMakeLists.txt, tests/png/Makemodule.am,
      tests/png/bug00381_1.c, tests/png/bug00381_2.c.
    - CVE-2017-6362

ubuntu/yakkety-security 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-unapplied version 2.2.1-1ubuntu3.3 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-02-28 14:47:34 UTC

Import patches-unapplied version 2.2.1-1ubuntu3.3 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 68eff0a0a249ba23a1c20c2e896b5b2491decc1d

New changelog entries:
  * SECURITY UPDATE: potential unsigned underflow
    - debian/patches/CVE-2016-10166.patch: refactor loop in
      src/gd_interpolation.c.
    - CVE-2016-10166
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in src/gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in src/gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: OOB reads of the TGA decompression buffer
    - debian/patches/CVE-2016-6906-pre1.patch: fix coverty warning in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-pre2.patch: fix TGA RLE decoding in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-1.patch: check for overflow in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-2.patch: add another overflow check in
      src/gd_tga.c.
    - CVE-2016-6906
  * SECURITY UPDATE: double-free in gdImageWebPtr()
    - debian/patches/CVE-2016-6912.patch: add helper function to indicate
      failure in src/gd_webp.c.
    - CVE-2016-6912
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      src/gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in
      src/gd.c.
    - CVE-2016-9933

ubuntu/yakkety-updates 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-unapplied version 2.2.1-1ubuntu3.3 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-02-28 14:47:34 UTC

Import patches-unapplied version 2.2.1-1ubuntu3.3 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 68eff0a0a249ba23a1c20c2e896b5b2491decc1d

New changelog entries:
  * SECURITY UPDATE: potential unsigned underflow
    - debian/patches/CVE-2016-10166.patch: refactor loop in
      src/gd_interpolation.c.
    - CVE-2016-10166
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in src/gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in src/gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: OOB reads of the TGA decompression buffer
    - debian/patches/CVE-2016-6906-pre1.patch: fix coverty warning in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-pre2.patch: fix TGA RLE decoding in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-1.patch: check for overflow in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-2.patch: add another overflow check in
      src/gd_tga.c.
    - CVE-2016-6906
  * SECURITY UPDATE: double-free in gdImageWebPtr()
    - debian/patches/CVE-2016-6912.patch: add helper function to indicate
      failure in src/gd_webp.c.
    - CVE-2016-6912
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      src/gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in
      src/gd.c.
    - CVE-2016-9933

ubuntu/precise-devel 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-unapplied version 2.0.36~rc1~dfsg-6ubuntu2.4 to ubuntu/precise...

Author: Marc Deslauriers
Author Date: 2017-02-28 16:05:46 UTC

Import patches-unapplied version 2.0.36~rc1~dfsg-6ubuntu2.4 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b4ee0d8066b3bbf1309a111fdba187ce51c51d50

New changelog entries:
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in gd.c.
    - CVE-2016-9933

applied/ubuntu/yakkety-security 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-applied version 2.2.1-1ubuntu3.3 to applied/ubuntu/yakkety-sec...

Author: Marc Deslauriers
Author Date: 2017-02-28 14:47:34 UTC

Import patches-applied version 2.2.1-1ubuntu3.3 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 71c4273f39f9b06be731584c60825083955b3f40
Unapplied parent: ee719353889d07f263db90ff6abcd6a2d08bce6f

New changelog entries:
  * SECURITY UPDATE: potential unsigned underflow
    - debian/patches/CVE-2016-10166.patch: refactor loop in
      src/gd_interpolation.c.
    - CVE-2016-10166
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in src/gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in src/gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: OOB reads of the TGA decompression buffer
    - debian/patches/CVE-2016-6906-pre1.patch: fix coverty warning in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-pre2.patch: fix TGA RLE decoding in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-1.patch: check for overflow in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-2.patch: add another overflow check in
      src/gd_tga.c.
    - CVE-2016-6906
  * SECURITY UPDATE: double-free in gdImageWebPtr()
    - debian/patches/CVE-2016-6912.patch: add helper function to indicate
      failure in src/gd_webp.c.
    - CVE-2016-6912
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      src/gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in
      src/gd.c.
    - CVE-2016-9933

ubuntu/precise-security 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-unapplied version 2.0.36~rc1~dfsg-6ubuntu2.4 to ubuntu/precise...

Author: Marc Deslauriers
Author Date: 2017-02-28 16:05:46 UTC

Import patches-unapplied version 2.0.36~rc1~dfsg-6ubuntu2.4 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b4ee0d8066b3bbf1309a111fdba187ce51c51d50

New changelog entries:
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in gd.c.
    - CVE-2016-9933

applied/ubuntu/yakkety-updates 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-applied version 2.2.1-1ubuntu3.3 to applied/ubuntu/yakkety-sec...

Author: Marc Deslauriers
Author Date: 2017-02-28 14:47:34 UTC

Import patches-applied version 2.2.1-1ubuntu3.3 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 71c4273f39f9b06be731584c60825083955b3f40
Unapplied parent: ee719353889d07f263db90ff6abcd6a2d08bce6f

New changelog entries:
  * SECURITY UPDATE: potential unsigned underflow
    - debian/patches/CVE-2016-10166.patch: refactor loop in
      src/gd_interpolation.c.
    - CVE-2016-10166
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in src/gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in src/gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: OOB reads of the TGA decompression buffer
    - debian/patches/CVE-2016-6906-pre1.patch: fix coverty warning in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-pre2.patch: fix TGA RLE decoding in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-1.patch: check for overflow in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-2.patch: add another overflow check in
      src/gd_tga.c.
    - CVE-2016-6906
  * SECURITY UPDATE: double-free in gdImageWebPtr()
    - debian/patches/CVE-2016-6912.patch: add helper function to indicate
      failure in src/gd_webp.c.
    - CVE-2016-6912
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      src/gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in
      src/gd.c.
    - CVE-2016-9933

applied/ubuntu/precise-updates 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-applied version 2.0.36~rc1~dfsg-6ubuntu2.4 to applied/ubuntu/p...

Author: Marc Deslauriers
Author Date: 2017-02-28 16:05:46 UTC

Import patches-applied version 2.0.36~rc1~dfsg-6ubuntu2.4 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 02845210d8cec4882e6608530460338e86ae0ee9
Unapplied parent: 9324145514162ed70450b381a9935ba2391353b9

New changelog entries:
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in gd.c.
    - CVE-2016-9933

applied/ubuntu/precise-security 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-applied version 2.0.36~rc1~dfsg-6ubuntu2.4 to applied/ubuntu/p...

Author: Marc Deslauriers
Author Date: 2017-02-28 16:05:46 UTC

Import patches-applied version 2.0.36~rc1~dfsg-6ubuntu2.4 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 02845210d8cec4882e6608530460338e86ae0ee9
Unapplied parent: 9324145514162ed70450b381a9935ba2391353b9

New changelog entries:
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in gd.c.
    - CVE-2016-9933

applied/ubuntu/precise-devel 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-applied version 2.0.36~rc1~dfsg-6ubuntu2.4 to applied/ubuntu/p...

Author: Marc Deslauriers
Author Date: 2017-02-28 16:05:46 UTC

Import patches-applied version 2.0.36~rc1~dfsg-6ubuntu2.4 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 02845210d8cec4882e6608530460338e86ae0ee9
Unapplied parent: 9324145514162ed70450b381a9935ba2391353b9

New changelog entries:
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in gd.c.
    - CVE-2016-9933

applied/ubuntu/yakkety-devel 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-applied version 2.2.1-1ubuntu3.3 to applied/ubuntu/yakkety-sec...

Author: Marc Deslauriers
Author Date: 2017-02-28 14:47:34 UTC

Import patches-applied version 2.2.1-1ubuntu3.3 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 71c4273f39f9b06be731584c60825083955b3f40
Unapplied parent: ee719353889d07f263db90ff6abcd6a2d08bce6f

New changelog entries:
  * SECURITY UPDATE: potential unsigned underflow
    - debian/patches/CVE-2016-10166.patch: refactor loop in
      src/gd_interpolation.c.
    - CVE-2016-10166
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in src/gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in src/gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: OOB reads of the TGA decompression buffer
    - debian/patches/CVE-2016-6906-pre1.patch: fix coverty warning in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-pre2.patch: fix TGA RLE decoding in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-1.patch: check for overflow in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-2.patch: add another overflow check in
      src/gd_tga.c.
    - CVE-2016-6906
  * SECURITY UPDATE: double-free in gdImageWebPtr()
    - debian/patches/CVE-2016-6912.patch: add helper function to indicate
      failure in src/gd_webp.c.
    - CVE-2016-6912
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      src/gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in
      src/gd.c.
    - CVE-2016-9933

ubuntu/precise-updates 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-unapplied version 2.0.36~rc1~dfsg-6ubuntu2.4 to ubuntu/precise...

Author: Marc Deslauriers
Author Date: 2017-02-28 16:05:46 UTC

Import patches-unapplied version 2.0.36~rc1~dfsg-6ubuntu2.4 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b4ee0d8066b3bbf1309a111fdba187ce51c51d50

New changelog entries:
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in gd.c.
    - CVE-2016-9933

ubuntu/yakkety-devel 2017-02-28 18:48:30 UTC 2017-02-28
Import patches-unapplied version 2.2.1-1ubuntu3.3 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-02-28 14:47:34 UTC

Import patches-unapplied version 2.2.1-1ubuntu3.3 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 68eff0a0a249ba23a1c20c2e896b5b2491decc1d

New changelog entries:
  * SECURITY UPDATE: potential unsigned underflow
    - debian/patches/CVE-2016-10166.patch: refactor loop in
      src/gd_interpolation.c.
    - CVE-2016-10166
  * SECURITY UPDATE: DoS vulnerability in gdImageCreateFromGd2Ctx()
    - debian/patches/CVE-2016-10167.patch: properly fail in src/gd_gd2.c.
    - CVE-2016-10167
  * SECURITY UPDATE: signed integer overflow in gd_io.c
    - debian/patches/CVE-2016-10168.patch: check counts in src/gd_gd2.c.
    - CVE-2016-10168
  * SECURITY UPDATE: OOB reads of the TGA decompression buffer
    - debian/patches/CVE-2016-6906-pre1.patch: fix coverty warning in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-pre2.patch: fix TGA RLE decoding in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-1.patch: check for overflow in
      src/gd_tga.c.
    - debian/patches/CVE-2016-6906-2.patch: add another overflow check in
      src/gd_tga.c.
    - CVE-2016-6906
  * SECURITY UPDATE: double-free in gdImageWebPtr()
    - debian/patches/CVE-2016-6912.patch: add helper function to indicate
      failure in src/gd_webp.c.
    - CVE-2016-6912
  * SECURITY UPDATE: DoS via oversized image
    - debian/patches/CVE-2016-9317.patch: check for oversized images in
      src/gd.c.
    - CVE-2016-9317
  * SECURITY UPDATE: DoS via stack consumption
    - debian/patches/CVE-2016-9933.patch: check for invalid colors in
      src/gd.c.
    - CVE-2016-9933

ubuntu/zesty-proposed 2017-01-19 04:17:20 UTC 2017-01-19
Import patches-unapplied version 2.2.4-2 to debian/sid

Author: Ondřej Surý
Author Date: 2017-01-18 20:06:46 UTC

Import patches-unapplied version 2.2.4-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 294e81959b03032bd99afb52af34f7517ce3f529

New changelog entries:
  * Apply correct patch on tiff_invalid_read

applied/ubuntu/zesty 2017-01-19 04:17:20 UTC 2017-01-19
Import patches-applied version 2.2.4-2 to applied/debian/sid

Author: Ondřej Surý
Author Date: 2017-01-18 20:06:46 UTC

Import patches-applied version 2.2.4-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 8d6c56dabcebb14504e23b24e5fb3e428d564f78
Unapplied parent: 076a6f866deef7071d68c1d0d55c2f00b78ac30e

New changelog entries:
  * Apply correct patch on tiff_invalid_read

ubuntu/zesty 2017-01-19 04:17:20 UTC 2017-01-19
Import patches-unapplied version 2.2.4-2 to debian/sid

Author: Ondřej Surý
Author Date: 2017-01-18 20:06:46 UTC

Import patches-unapplied version 2.2.4-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 294e81959b03032bd99afb52af34f7517ce3f529

New changelog entries:
  * Apply correct patch on tiff_invalid_read

applied/ubuntu/zesty-proposed 2017-01-19 04:17:20 UTC 2017-01-19
Import patches-applied version 2.2.4-2 to applied/debian/sid

Author: Ondřej Surý
Author Date: 2017-01-18 20:06:46 UTC

Import patches-applied version 2.2.4-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 8d6c56dabcebb14504e23b24e5fb3e428d564f78
Unapplied parent: 076a6f866deef7071d68c1d0d55c2f00b78ac30e

New changelog entries:
  * Apply correct patch on tiff_invalid_read

ubuntu/yakkety-proposed 2016-08-10 19:14:33 UTC 2016-08-10
Import patches-unapplied version 2.2.1-1ubuntu3 to ubuntu/yakkety-proposed

Author: Marc Deslauriers
Author Date: 2016-08-10 17:55:18 UTC

Import patches-unapplied version 2.2.1-1ubuntu3 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: fb76cf76cebc161c0b1f611e9952f6bfc1323e13

New changelog entries:
  * SECURITY UPDATE: out of bounds read in TGA file parsing
    - debian/patches/CVE-2016-6132.patch: properly validate image data in
      src/gd_tga.c.
    - CVE-2016-6132
  * SECURITY UPDATE: OOB or OOM in gdImageScale
    - debian/patches/CVE-2016-6207.patch: check for overflows, use floats,
      and check return codes in src/gd.c, src/gd_interpolation.c.
    - CVE-2016-6207
  * SECURITY UPDATE: out-of-bounds read issue with unsupported TGA
    bpp/alphabit combinations
    - debian/patches/CVE-2016-6214.patch: improve checks in src/gd_tga.c.
    - CVE-2016-6214

ubuntu/yakkety 2016-08-10 19:14:33 UTC 2016-08-10
Import patches-unapplied version 2.2.1-1ubuntu3 to ubuntu/yakkety-proposed

Author: Marc Deslauriers
Author Date: 2016-08-10 17:55:18 UTC

Import patches-unapplied version 2.2.1-1ubuntu3 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: fb76cf76cebc161c0b1f611e9952f6bfc1323e13

New changelog entries:
  * SECURITY UPDATE: out of bounds read in TGA file parsing
    - debian/patches/CVE-2016-6132.patch: properly validate image data in
      src/gd_tga.c.
    - CVE-2016-6132
  * SECURITY UPDATE: OOB or OOM in gdImageScale
    - debian/patches/CVE-2016-6207.patch: check for overflows, use floats,
      and check return codes in src/gd.c, src/gd_interpolation.c.
    - CVE-2016-6207
  * SECURITY UPDATE: out-of-bounds read issue with unsupported TGA
    bpp/alphabit combinations
    - debian/patches/CVE-2016-6214.patch: improve checks in src/gd_tga.c.
    - CVE-2016-6214

applied/ubuntu/yakkety-proposed 2016-08-10 19:14:33 UTC 2016-08-10
Import patches-applied version 2.2.1-1ubuntu3 to applied/ubuntu/yakkety-proposed

Author: Marc Deslauriers
Author Date: 2016-08-10 17:55:18 UTC

Import patches-applied version 2.2.1-1ubuntu3 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 675a75df0333d4aceca822ec6f5a08c00637f90e
Unapplied parent: a30a0d65d38d3c174974e8ea9b01ea3d825adb13

New changelog entries:
  * SECURITY UPDATE: out of bounds read in TGA file parsing
    - debian/patches/CVE-2016-6132.patch: properly validate image data in
      src/gd_tga.c.
    - CVE-2016-6132
  * SECURITY UPDATE: OOB or OOM in gdImageScale
    - debian/patches/CVE-2016-6207.patch: check for overflows, use floats,
      and check return codes in src/gd.c, src/gd_interpolation.c.
    - CVE-2016-6207
  * SECURITY UPDATE: out-of-bounds read issue with unsupported TGA
    bpp/alphabit combinations
    - debian/patches/CVE-2016-6214.patch: improve checks in src/gd_tga.c.
    - CVE-2016-6214

applied/ubuntu/yakkety 2016-08-10 19:14:33 UTC 2016-08-10
Import patches-applied version 2.2.1-1ubuntu3 to applied/ubuntu/yakkety-proposed

Author: Marc Deslauriers
Author Date: 2016-08-10 17:55:18 UTC

Import patches-applied version 2.2.1-1ubuntu3 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 675a75df0333d4aceca822ec6f5a08c00637f90e
Unapplied parent: a30a0d65d38d3c174974e8ea9b01ea3d825adb13

New changelog entries:
  * SECURITY UPDATE: out of bounds read in TGA file parsing
    - debian/patches/CVE-2016-6132.patch: properly validate image data in
      src/gd_tga.c.
    - CVE-2016-6132
  * SECURITY UPDATE: OOB or OOM in gdImageScale
    - debian/patches/CVE-2016-6207.patch: check for overflows, use floats,
      and check return codes in src/gd.c, src/gd_interpolation.c.
    - CVE-2016-6207
  * SECURITY UPDATE: out-of-bounds read issue with unsupported TGA
    bpp/alphabit combinations
    - debian/patches/CVE-2016-6214.patch: improve checks in src/gd_tga.c.
    - CVE-2016-6214

applied/ubuntu/wily-security 2016-07-11 16:59:05 UTC 2016-07-11
Import patches-applied version 2.1.1-4ubuntu0.15.10.2 to applied/ubuntu/wily-...

Author: Marc Deslauriers
Author Date: 2016-07-08 18:40:07 UTC

Import patches-applied version 2.1.1-4ubuntu0.15.10.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 240ddc3b71214eafbde7891a536514e4408b7ca1
Unapplied parent: 6e006b64d37c22e184703f252cabe20d354fe830

New changelog entries:
  * SECURITY UPDATE: stack overflow with large names
    - debian/patches/CVE-2016-5116.patch: properly handle names in
      src/gd_xbm.c.
    - CVE-2016-5116
  * SECURITY UPDATE: integer overflow in _gd2GetHeader()
    - debian/patches/CVE-2016-5766.patch: check for overflow in
      src/gd_gd2.c.
    - CVE-2016-5766
  * SECURITY UPDATE: denial of service via invalid color index
    - debian/patches/CVE-2016-6128.patch: check color index in
      src/gd_crop.c, added test to tests/CMakeLists.txt, tests/Makefile.am,
      tests/gdimagecrop/php_bug_72494.c.
    - CVE-2016-6128
  * SECURITY UPDATE: out of bounds read of masks array
    - debian/patches/CVE-2016-6161.patch: properly handle EOF marker in
      src/gd_gif_out.c.
    - CVE-2016-6161

applied/ubuntu/wily-devel 2016-07-11 16:59:05 UTC 2016-07-11
Import patches-applied version 2.1.1-4ubuntu0.15.10.2 to applied/ubuntu/wily-...

Author: Marc Deslauriers
Author Date: 2016-07-08 18:40:07 UTC

Import patches-applied version 2.1.1-4ubuntu0.15.10.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 240ddc3b71214eafbde7891a536514e4408b7ca1
Unapplied parent: 6e006b64d37c22e184703f252cabe20d354fe830

New changelog entries:
  * SECURITY UPDATE: stack overflow with large names
    - debian/patches/CVE-2016-5116.patch: properly handle names in
      src/gd_xbm.c.
    - CVE-2016-5116
  * SECURITY UPDATE: integer overflow in _gd2GetHeader()
    - debian/patches/CVE-2016-5766.patch: check for overflow in
      src/gd_gd2.c.
    - CVE-2016-5766
  * SECURITY UPDATE: denial of service via invalid color index
    - debian/patches/CVE-2016-6128.patch: check color index in
      src/gd_crop.c, added test to tests/CMakeLists.txt, tests/Makefile.am,
      tests/gdimagecrop/php_bug_72494.c.
    - CVE-2016-6128
  * SECURITY UPDATE: out of bounds read of masks array
    - debian/patches/CVE-2016-6161.patch: properly handle EOF marker in
      src/gd_gif_out.c.
    - CVE-2016-6161

ubuntu/wily-security 2016-07-11 16:59:05 UTC 2016-07-11
Import patches-unapplied version 2.1.1-4ubuntu0.15.10.2 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-07-08 18:40:07 UTC

Import patches-unapplied version 2.1.1-4ubuntu0.15.10.2 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: ce28cf29b00b4687284b892090fe6b719eee54d6

New changelog entries:
  * SECURITY UPDATE: stack overflow with large names
    - debian/patches/CVE-2016-5116.patch: properly handle names in
      src/gd_xbm.c.
    - CVE-2016-5116
  * SECURITY UPDATE: integer overflow in _gd2GetHeader()
    - debian/patches/CVE-2016-5766.patch: check for overflow in
      src/gd_gd2.c.
    - CVE-2016-5766
  * SECURITY UPDATE: denial of service via invalid color index
    - debian/patches/CVE-2016-6128.patch: check color index in
      src/gd_crop.c, added test to tests/CMakeLists.txt, tests/Makefile.am,
      tests/gdimagecrop/php_bug_72494.c.
    - CVE-2016-6128
  * SECURITY UPDATE: out of bounds read of masks array
    - debian/patches/CVE-2016-6161.patch: properly handle EOF marker in
      src/gd_gif_out.c.
    - CVE-2016-6161

ubuntu/wily-devel 2016-07-11 16:59:05 UTC 2016-07-11
Import patches-unapplied version 2.1.1-4ubuntu0.15.10.2 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-07-08 18:40:07 UTC

Import patches-unapplied version 2.1.1-4ubuntu0.15.10.2 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: ce28cf29b00b4687284b892090fe6b719eee54d6

New changelog entries:
  * SECURITY UPDATE: stack overflow with large names
    - debian/patches/CVE-2016-5116.patch: properly handle names in
      src/gd_xbm.c.
    - CVE-2016-5116
  * SECURITY UPDATE: integer overflow in _gd2GetHeader()
    - debian/patches/CVE-2016-5766.patch: check for overflow in
      src/gd_gd2.c.
    - CVE-2016-5766
  * SECURITY UPDATE: denial of service via invalid color index
    - debian/patches/CVE-2016-6128.patch: check color index in
      src/gd_crop.c, added test to tests/CMakeLists.txt, tests/Makefile.am,
      tests/gdimagecrop/php_bug_72494.c.
    - CVE-2016-6128
  * SECURITY UPDATE: out of bounds read of masks array
    - debian/patches/CVE-2016-6161.patch: properly handle EOF marker in
      src/gd_gif_out.c.
    - CVE-2016-6161

ubuntu/wily-updates 2016-07-11 16:59:05 UTC 2016-07-11
Import patches-unapplied version 2.1.1-4ubuntu0.15.10.2 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-07-08 18:40:07 UTC

Import patches-unapplied version 2.1.1-4ubuntu0.15.10.2 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: ce28cf29b00b4687284b892090fe6b719eee54d6

New changelog entries:
  * SECURITY UPDATE: stack overflow with large names
    - debian/patches/CVE-2016-5116.patch: properly handle names in
      src/gd_xbm.c.
    - CVE-2016-5116
  * SECURITY UPDATE: integer overflow in _gd2GetHeader()
    - debian/patches/CVE-2016-5766.patch: check for overflow in
      src/gd_gd2.c.
    - CVE-2016-5766
  * SECURITY UPDATE: denial of service via invalid color index
    - debian/patches/CVE-2016-6128.patch: check color index in
      src/gd_crop.c, added test to tests/CMakeLists.txt, tests/Makefile.am,
      tests/gdimagecrop/php_bug_72494.c.
    - CVE-2016-6128
  * SECURITY UPDATE: out of bounds read of masks array
    - debian/patches/CVE-2016-6161.patch: properly handle EOF marker in
      src/gd_gif_out.c.
    - CVE-2016-6161

applied/ubuntu/wily-updates 2016-07-11 16:59:05 UTC 2016-07-11
Import patches-applied version 2.1.1-4ubuntu0.15.10.2 to applied/ubuntu/wily-...

Author: Marc Deslauriers
Author Date: 2016-07-08 18:40:07 UTC

Import patches-applied version 2.1.1-4ubuntu0.15.10.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 240ddc3b71214eafbde7891a536514e4408b7ca1
Unapplied parent: 6e006b64d37c22e184703f252cabe20d354fe830

New changelog entries:
  * SECURITY UPDATE: stack overflow with large names
    - debian/patches/CVE-2016-5116.patch: properly handle names in
      src/gd_xbm.c.
    - CVE-2016-5116
  * SECURITY UPDATE: integer overflow in _gd2GetHeader()
    - debian/patches/CVE-2016-5766.patch: check for overflow in
      src/gd_gd2.c.
    - CVE-2016-5766
  * SECURITY UPDATE: denial of service via invalid color index
    - debian/patches/CVE-2016-6128.patch: check color index in
      src/gd_crop.c, added test to tests/CMakeLists.txt, tests/Makefile.am,
      tests/gdimagecrop/php_bug_72494.c.
    - CVE-2016-6128
  * SECURITY UPDATE: out of bounds read of masks array
    - debian/patches/CVE-2016-6161.patch: properly handle EOF marker in
      src/gd_gif_out.c.
    - CVE-2016-6161

1100 of 248 results

Other repositories

Name Last Modified
lp:ubuntu/+source/libgd2 2019-10-18
11 of 1 result
You can't create new repositories for libgd2 in Ubuntu.