SUSE-SU-2024:0786-1: important: Security update for giflib
SLE-SECURITY-UPDATES
null at suse.de
Thu Mar 7 08:30:05 UTC 2024
# Security update for giflib
Announcement ID: SUSE-SU-2024:0786-1
Rating: important
References:
* bsc#1198880
* bsc#1200551
* bsc#1217390
Cross-References:
* CVE-2021-40633
* CVE-2022-28506
* CVE-2023-48161
CVSS scores:
* CVE-2021-40633 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2021-40633 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-28506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2022-28506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2023-48161 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-48161 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for giflib fixes the following issues:
Update to version 5.2.2
* Fixes for CVE-2023-48161 (bsc#1217390), CVE-2022-28506 (bsc#1198880)
* # 138 Documentation for obsolete utilities still installed
* # 139: Typo in "LZW image data" page ("110_2 = 4_10")
* # 140: Typo in "LZW image data" page ("LWZ")
* # 141: Typo in "Bits and bytes" page ("filed")
* Note as already fixed SF issue #143: cannot compile under mingw
* # 144: giflib-5.2.1 cannot be build on windows and other platforms using c89
* # 145: Remove manual pages installation for binaries that are not installed
too
* # 146: [PATCH] Limit installed man pages to binaries, move giflib to section
7
* # 147 [PATCH] Fixes to doc/whatsinagif/ content
* # 148: heap Out of Bound Read in gif2rgb.c:298 DumpScreen2RGB
* Declared no-info on SF issue #150: There is a denial of service
vulnerability in GIFLIB 5.2.1
* Declared Won't-fix on SF issue 149: Out of source builds no longer possible
* # 151: A heap-buffer-overflow in gif2rgb.c:294:45
* # 152: Fix some typos on the html documentation and man pages
* # 153: Fix segmentation faults due to non correct checking for args
* # 154: Recover the giffilter manual page
* # 155: Add gifsponge docs
* # 157: An OutofMemory-Exception or Memory Leak in gif2rgb
* # 158: There is a null pointer problem in gif2rgb
* # 159 A heap-buffer-overflow in GIFLIB5.2.1 DumpScreen2RGB() in
gif2rgb.c:298:45
* # 163: detected memory leaks in openbsd_reallocarray giflib/openbsd-
reallocarray.c
* # 164: detected memory leaks in GifMakeMapObject giflib/gifalloc.c
* # 166: a read zero page leads segment fault in getarg.c and memory leaks in
gif2rgb.c and gifmalloc.c
* # 167: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function
at Line 321 of gif2rgb.c
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-786=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-786=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-786=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-786=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-786=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-786=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-786=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-786=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-786=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-786=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-786=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-786=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-786=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-786=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-786=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-786=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-786=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* libgif7-5.2.2-150000.4.13.1
* giflib-progs-5.2.2-150000.4.13.1
* giflib-progs-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* openSUSE Leap 15.5 (x86_64)
* libgif7-32bit-5.2.2-150000.4.13.1
* giflib-devel-32bit-5.2.2-150000.4.13.1
* libgif7-32bit-debuginfo-5.2.2-150000.4.13.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Manager Proxy 4.3 (x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libgif7-5.2.2-150000.4.13.1
* giflib-debugsource-5.2.2-150000.4.13.1
* libgif7-debuginfo-5.2.2-150000.4.13.1
* giflib-devel-5.2.2-150000.4.13.1
## References:
* https://www.suse.com/security/cve/CVE-2021-40633.html
* https://www.suse.com/security/cve/CVE-2022-28506.html
* https://www.suse.com/security/cve/CVE-2023-48161.html
* https://bugzilla.suse.com/show_bug.cgi?id=1198880
* https://bugzilla.suse.com/show_bug.cgi?id=1200551
* https://bugzilla.suse.com/show_bug.cgi?id=1217390
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20240307/51d9ee97/attachment.htm>
More information about the sle-security-updates
mailing list