openSUSE Security Update: Security update for gd ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2117-1 Rating: moderate References: #987577 #988032 #991436 #991622 #991710 Cross-References: CVE-2016-6128 CVE-2016-6132 CVE-2016-6161 CVE-2016-6207 CVE-2016-6214 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for gd fixes the following issues: * CVE-2016-6214: Buffer over-read issue when parsing crafted TGA file [bsc#991436] * CVE-2016-6132: read out-of-bands was found in the parsing of TGA files using libgd [bsc#987577] * CVE-2016-6128: Invalid color index not properly handled [bsc#991710] * CVE-2016-6207: Integer overflow error within _gdContributionsAlloc() [bsc#991622] * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032] Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-1003=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): gd-2.1.0-7.11.1 gd-debuginfo-2.1.0-7.11.1 gd-debugsource-2.1.0-7.11.1 gd-devel-2.1.0-7.11.1 libgd3-2.1.0-7.11.1 libgd3-debuginfo-2.1.0-7.11.1 - openSUSE 13.2 (x86_64): libgd3-32bit-2.1.0-7.11.1 libgd3-debuginfo-32bit-2.1.0-7.11.1 References: https://www.suse.com/security/cve/CVE-2016-6128.html https://www.suse.com/security/cve/CVE-2016-6132.html https://www.suse.com/security/cve/CVE-2016-6161.html https://www.suse.com/security/cve/CVE-2016-6207.html https://www.suse.com/security/cve/CVE-2016-6214.html https://bugzilla.suse.com/987577 https://bugzilla.suse.com/988032 https://bugzilla.suse.com/991436 https://bugzilla.suse.com/991622 https://bugzilla.suse.com/991710