|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2016-10168: gd,php5,php53,php7: Signed Integer Overflow gd_io.c | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Andreas Stieger <astieger> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | meissner, mikhail.kasimov, pgajdos |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | maint:running:63366:moderate CVSSv2:SUSE:CVE-2016-10168:4.4:(AV:L/AC:M/Au:N/C:P/I:P/A:P) maint:running:63376:moderate maint:released:oes11-sp2:63399 maint:released:sle10-sp3:63377 CVSSv2:NVD:CVE-2016-10168:6.8:(AV:N/AC:M/Au:N/C:P/I:P/A:P) CVSSv3:RedHat:CVE-2016-10168:5.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) CVSSv3:RedHat:CVE-2016-10168:6.3:(AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | 1022069 | ||
| Bug Blocks: | |||
| Deadline: | 2017-02-16 | ||
| Attachments: |
ext_gd_tests_bug73869a.gd2
ext_gd_tests_bug73869b.gd2 |
||
|
Description
Andreas Stieger
2017-01-27 12:56:46 UTC
bugbot adjusting priority CVE Assignment Team: "Use CVE-2016-10168. (This CVE is for all of 69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6. In other words, "make sure that either chunk count is actually greater than zero" does not have a separate CVE.)" (ref: http://seclists.org/oss-sec/2017/q1/218) All versions seem affected An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2017-02-13. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63366 An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2017-02-13. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63367 php commit http://git.php.net/?p=php-src.git;a=commitdiff;h=d2274b01cbbadf5516b3ea87ad76fbae18834007 all php versions BEFORE $ php test.php PHP Warning: imagecreatefromgd2(): gd warning: one parameter to a memory allocation multiplication is negative or zero, failing operation gracefully in /022265/test.php on line 2 PHP Warning: imagecreatefromgd2(): 'bug73869a.gd2' is not a valid GD2 file in /022265/test.php on line 2 bool(false) PHP Warning: imagecreatefromgd2(): gd warning: one parameter to a memory allocation multiplication is negative or zero, failing operation gracefully in /022265/test.php on line 3 PHP Warning: imagecreatefromgd2(): 'bug73869b.gd2' is not a valid GD2 file in /022265/test.php on line 3 bool(false) $ AFTER $ php test.php PHP Warning: imagecreatefromgd2(): 'bug73869a.gd2' is not a valid GD2 file in /022265/test.php on line 2 bool(false) PHP Warning: imagecreatefromgd2(): 'bug73869b.gd2' is not a valid GD2 file in /022265/test.php on line 3 bool(false) $ All versions of gd affected. I believe all fixed. An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2017-02-16. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63376 Created attachment 713960 [details]
ext_gd_tests_bug73869a.gd2
QA REPRODUCER (gd):
gd2togif ext_gd_tests_bug73869a.gd2 foo.gif
should not report "GD Warning: one parameter to a memory allocation multiplication is negative or zero, failing operation gracefully", but only
"Input is not in GD2 format!"
Created attachment 713961 [details]
ext_gd_tests_bug73869b.gd2
QA REOPRODUCER(gd):
gd2togif ext_gd_tests_bug73869b.gd2 foo.gif
should only report that this is not a valid GD2 input file.
SUSE-SU-2017:0459-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1022264,1022265,1022283 CVE References: CVE-2016-10167,CVE-2016-10168,CVE-2016-9317 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): gd-2.0.36.RC1-52.32.1 SUSE Linux Enterprise Server 11-SP4 (src): gd-2.0.36.RC1-52.32.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): gd-2.0.36.RC1-52.32.1 SUSE-SU-2017:0468-1: An update that fixes 6 vulnerabilities is now available. Category: security (moderate) Bug References: 1022263,1022264,1022265,1022283,1022284,1022553 CVE References: CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-6906,CVE-2016-6912,CVE-2016-9317 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Workstation Extension 12-SP1 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Server 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Server 12-SP1 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Desktop 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Desktop 12-SP1 (src): gd-2.1.0-23.1 SUSE-SU-2017:0534-1: An update that fixes 13 vulnerabilities is now available. Category: security (important) Bug References: 1008026,1019547,1019550,1019568,1019570,1022219,1022255,1022257,1022260,1022262,1022263,1022264,1022265 CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10162,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478,CVE-2016-7479,CVE-2016-7480,CVE-2016-9138,CVE-2017-5340 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): php7-7.0.7-35.1 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): php7-7.0.7-35.1 SUSE Linux Enterprise Module for Web Scripting 12 (src): php7-7.0.7-35.1 openSUSE-SU-2017:0548-1: An update that fixes 6 vulnerabilities is now available. Category: security (moderate) Bug References: 1022263,1022264,1022265,1022283,1022284,1022553 CVE References: CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-6906,CVE-2016-6912,CVE-2016-9317 Sources used: openSUSE Leap 42.2 (src): gd-2.1.0-16.1 openSUSE Leap 42.1 (src): gd-2.1.0-19.1 SUSE-SU-2017:0556-1: An update that fixes 8 vulnerabilities is now available. Category: security (important) Bug References: 1019550,1022219,1022255,1022257,1022260,1022263,1022264,1022265 CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): php5-5.5.14-96.1 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): php5-5.5.14-96.1 SUSE Linux Enterprise Module for Web Scripting 12 (src): php5-5.5.14-96.1 SUSE-SU-2017:0568-1: An update that fixes 8 vulnerabilities is now available. Category: security (important) Bug References: 1019550,1022219,1022255,1022257,1022260,1022263,1022264,1022265 CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478 Sources used: SUSE OpenStack Cloud 5 (src): php53-5.3.17-101.1 SUSE Manager Proxy 2.1 (src): php53-5.3.17-101.1 SUSE Manager 2.1 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Software Development Kit 11-SP4 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Server 11-SP4 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): php53-5.3.17-101.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): php53-5.3.17-101.1 openSUSE-SU-2017:0588-1: An update that fixes 13 vulnerabilities is now available. Category: security (important) Bug References: 1008026,1019547,1019550,1019568,1019570,1022219,1022255,1022257,1022260,1022262,1022263,1022264,1022265 CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10162,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478,CVE-2016-7479,CVE-2016-7480,CVE-2016-9138,CVE-2017-5340 Sources used: openSUSE Leap 42.2 (src): php7-7.0.7-12.1 released This is an autogenerated message for OBS integration: This bug (1022265) was mentioned in https://build.opensuse.org/request/show/510888 Factory / gd |