Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2016:2772-1

Опубликовано: 10 нояб. 2016
Источник: suse-cvrf

Описание

Security update for gd

This update for gd fixes the following security issues:

  • CVE-2016-7568: A specially crafted image file could cause an application crash or potentially execute arbitrary code when the image is converted to webp (bsc#1001900)
  • CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
  • CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)

This update was imported from the SUSE:SLE-12:Update update project.

Список пакетов

openSUSE Leap 42.1
gd-2.1.0-13.1
gd-32bit-2.1.0-13.1
gd-devel-2.1.0-13.1

Описание

The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.


Затронутые продукты
openSUSE Leap 42.1:gd-2.1.0-13.1
openSUSE Leap 42.1:gd-32bit-2.1.0-13.1
openSUSE Leap 42.1:gd-devel-2.1.0-13.1

Ссылки

Описание

Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.


Затронутые продукты
openSUSE Leap 42.1:gd-2.1.0-13.1
openSUSE Leap 42.1:gd-32bit-2.1.0-13.1
openSUSE Leap 42.1:gd-devel-2.1.0-13.1

Ссылки

Описание

Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.


Затронутые продукты
openSUSE Leap 42.1:gd-2.1.0-13.1
openSUSE Leap 42.1:gd-32bit-2.1.0-13.1
openSUSE Leap 42.1:gd-devel-2.1.0-13.1

Ссылки