SUSE-SU-2017:0468-1: moderate: Security update for gd
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed Feb 15 04:09:47 MST 2017
SUSE Security Update: Security update for gd
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0468-1
Rating: moderate
References: #1022263 #1022264 #1022265 #1022283 #1022284
#1022553
Cross-References: CVE-2016-10166 CVE-2016-10167 CVE-2016-10168
CVE-2016-6906 CVE-2016-6912 CVE-2016-9317
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for gd fixes the following security issues:
- CVE-2016-6906: An out-of-bounds read in TGA decompression was fixed
which could have lead to crashes. (bsc#1022553)
- CVE-2016-6912: Double free vulnerability in the gdImageWebPtr function
in the GD Graphics Library (aka libgd) allowed remote attackers to have
unspecified impact via large width and height values. (bsc#1022284)
- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
(aka libgd) allowed remote attackers to cause a denial of service
(system hang) via an oversized image. (bsc#1022283)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
functions could lead to memory corruption in the GD Graphics Library
(aka libgd) (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
could lead to libgd running out of memory even on small files.
(bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library
(aka libgd) could lead to memory corruption (bsc#1022265)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2017-241=1
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2017-241=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-241=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-241=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-241=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-241=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-241=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-241=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-241=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
gd-32bit-2.1.0-23.1
gd-debuginfo-32bit-2.1.0-23.1
gd-debugsource-2.1.0-23.1
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
gd-32bit-2.1.0-23.1
gd-debuginfo-32bit-2.1.0-23.1
gd-debugsource-2.1.0-23.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
gd-debuginfo-2.1.0-23.1
gd-debugsource-2.1.0-23.1
gd-devel-2.1.0-23.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
gd-debuginfo-2.1.0-23.1
gd-debugsource-2.1.0-23.1
gd-devel-2.1.0-23.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
gd-2.1.0-23.1
gd-debuginfo-2.1.0-23.1
gd-debugsource-2.1.0-23.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
gd-2.1.0-23.1
gd-debuginfo-2.1.0-23.1
gd-debugsource-2.1.0-23.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
gd-2.1.0-23.1
gd-debuginfo-2.1.0-23.1
gd-debugsource-2.1.0-23.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
gd-2.1.0-23.1
gd-32bit-2.1.0-23.1
gd-debuginfo-2.1.0-23.1
gd-debuginfo-32bit-2.1.0-23.1
gd-debugsource-2.1.0-23.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
gd-2.1.0-23.1
gd-32bit-2.1.0-23.1
gd-debuginfo-2.1.0-23.1
gd-debuginfo-32bit-2.1.0-23.1
gd-debugsource-2.1.0-23.1
References:
https://www.suse.com/security/cve/CVE-2016-10166.html
https://www.suse.com/security/cve/CVE-2016-10167.html
https://www.suse.com/security/cve/CVE-2016-10168.html
https://www.suse.com/security/cve/CVE-2016-6906.html
https://www.suse.com/security/cve/CVE-2016-6912.html
https://www.suse.com/security/cve/CVE-2016-9317.html
https://bugzilla.suse.com/1022263
https://bugzilla.suse.com/1022264
https://bugzilla.suse.com/1022265
https://bugzilla.suse.com/1022283
https://bugzilla.suse.com/1022284
https://bugzilla.suse.com/1022553
More information about the sle-security-updates
mailing list