Revision Date: | 2017-02-15 | Version: | 1 |
Title: | Security update for gd (Moderate) |
Description: |
This update for gd fixes the following security issues:
- CVE-2016-6906: An out-of-bounds read in TGA decompression was fixed which could have lead to crashes. (bsc#1022553) - CVE-2016-6912: Double free vulnerability in the gdImageWebPtr function in the GD Graphics Library (aka libgd) allowed remote attackers to have unspecified impact via large width and height values. (bsc#1022284) - CVE-2016-9317: The gdImageCreate function in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (system hang) via an oversized image. (bsc#1022283) - CVE-2016-10166: A potential unsigned underflow in gd interpolation functions could lead to memory corruption in the GD Graphics Library (aka libgd) (bsc#1022263) - CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx() could lead to libgd running out of memory even on small files. (bsc#1022264) - CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead to memory corruption (bsc#1022265)
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1022263 1022264 1022265 1022283 1022284 1022553 CVE-2016-10166 CVE-2016-10167 CVE-2016-10168 CVE-2016-6906 CVE-2016-6912 CVE-2016-9317 SUSE-SU-2017:0468-1
|
Platform(s): | SUSE Linux Enterprise Desktop 12 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP2 is installed AND Package Information
gd-2.1.0-23.1 is installed
OR gd-32bit-2.1.0-23.1 is installed
|