SUSE-SU-2017:0468-1: moderate: Security update for gd

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Feb 15 04:09:47 MST 2017


   SUSE Security Update: Security update for gd
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:0468-1
Rating:             moderate
References:         #1022263 #1022264 #1022265 #1022283 #1022284 
                    #1022553 
Cross-References:   CVE-2016-10166 CVE-2016-10167 CVE-2016-10168
                    CVE-2016-6906 CVE-2016-6912 CVE-2016-9317
                   
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP2
                    SUSE Linux Enterprise Workstation Extension 12-SP1
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Software Development Kit 12-SP1
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Desktop 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

   An update that fixes 6 vulnerabilities is now available.

Description:


   This update for gd fixes the following security issues:

   - CVE-2016-6906: An out-of-bounds read in TGA decompression was fixed
     which could have lead to crashes. (bsc#1022553)
   - CVE-2016-6912: Double free vulnerability in the gdImageWebPtr function
     in the GD Graphics Library (aka libgd) allowed remote attackers to have
     unspecified impact via large width and height values. (bsc#1022284)
   - CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
     (aka libgd) allowed remote attackers to cause a denial of service
     (system hang) via an oversized image.  (bsc#1022283)
   - CVE-2016-10166: A potential unsigned underflow in gd interpolation
     functions could lead to memory corruption in the GD Graphics Library
     (aka libgd) (bsc#1022263)
   - CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
     could lead to libgd running out of memory even on small files.
     (bsc#1022264)
   - CVE-2016-10168: A signed integer overflow in the GD Graphics Library
     (aka libgd) could lead to memory corruption (bsc#1022265)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP2:

      zypper in -t patch SUSE-SLE-WE-12-SP2-2017-241=1

   - SUSE Linux Enterprise Workstation Extension 12-SP1:

      zypper in -t patch SUSE-SLE-WE-12-SP1-2017-241=1

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-241=1

   - SUSE Linux Enterprise Software Development Kit 12-SP1:

      zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-241=1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-241=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-241=1

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-241=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-241=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-241=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):

      gd-32bit-2.1.0-23.1
      gd-debuginfo-32bit-2.1.0-23.1
      gd-debugsource-2.1.0-23.1

   - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

      gd-32bit-2.1.0-23.1
      gd-debuginfo-32bit-2.1.0-23.1
      gd-debugsource-2.1.0-23.1

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      gd-debuginfo-2.1.0-23.1
      gd-debugsource-2.1.0-23.1
      gd-devel-2.1.0-23.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

      gd-debuginfo-2.1.0-23.1
      gd-debugsource-2.1.0-23.1
      gd-devel-2.1.0-23.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      gd-2.1.0-23.1
      gd-debuginfo-2.1.0-23.1
      gd-debugsource-2.1.0-23.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):

      gd-2.1.0-23.1
      gd-debuginfo-2.1.0-23.1
      gd-debugsource-2.1.0-23.1

   - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

      gd-2.1.0-23.1
      gd-debuginfo-2.1.0-23.1
      gd-debugsource-2.1.0-23.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      gd-2.1.0-23.1
      gd-32bit-2.1.0-23.1
      gd-debuginfo-2.1.0-23.1
      gd-debuginfo-32bit-2.1.0-23.1
      gd-debugsource-2.1.0-23.1

   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

      gd-2.1.0-23.1
      gd-32bit-2.1.0-23.1
      gd-debuginfo-2.1.0-23.1
      gd-debuginfo-32bit-2.1.0-23.1
      gd-debugsource-2.1.0-23.1


References:

   https://www.suse.com/security/cve/CVE-2016-10166.html
   https://www.suse.com/security/cve/CVE-2016-10167.html
   https://www.suse.com/security/cve/CVE-2016-10168.html
   https://www.suse.com/security/cve/CVE-2016-6906.html
   https://www.suse.com/security/cve/CVE-2016-6912.html
   https://www.suse.com/security/cve/CVE-2016-9317.html
   https://bugzilla.suse.com/1022263
   https://bugzilla.suse.com/1022264
   https://bugzilla.suse.com/1022265
   https://bugzilla.suse.com/1022283
   https://bugzilla.suse.com/1022284
   https://bugzilla.suse.com/1022553



More information about the sle-security-updates mailing list