Bugzilla – Bug 1022264
VUL-1: CVE-2016-10167: gd,php5,php53,php7: DOS vulnerability in gdImageCreateFromGd2Ctx()
Last modified: 2017-09-19 22:37:50 UTC
+++ This bug was initially created as a clone of Bug #1022069 +++ Ref: http://seclists.org/oss-sec/2017/q1/202 =============================================== 2/ Fix DOS vulnerability in gdImageCreateFromGd2Ctx() Commit: https://github.com/libgd/libgd/commit/fe9ed49dafa993e3af96b6a5a589efeea9bfb36f
bugbot adjusting priority
Seems to affect all packages
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2017-02-13. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63366
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2017-02-13. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63367
php commit http://git.php.net/?p=php-src.git;a=commitdiff;h=f1b2afc9d9e77edf41804f5dfc4e2069d8a12975
For the testcase from php commit: BEFORE $ php test.php resource(5) of type (gd) $ AFTER $ php test.php PHP Warning: imagecreatefromgd2(): gd2: EOF while reading in /022264/test.php on line 2 PHP Warning: imagecreatefromgd2(): '/022264/bug73868.gd2' is not a valid GD2 file in /022264/test.php on line 2 bool(false) $
I believe all fixed.
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2017-02-16. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63376
Created attachment 713956 [details] ext_gd_tests_bug73868.gd2 QA REPRODUCER (for gd): gd2togif ext_gd_tests_bug73868.gd2 foo.gif should report GD Warning: gd2: EOF while reading Input is not in GD2 format!
SUSE-SU-2017:0459-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1022264,1022265,1022283 CVE References: CVE-2016-10167,CVE-2016-10168,CVE-2016-9317 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): gd-2.0.36.RC1-52.32.1 SUSE Linux Enterprise Server 11-SP4 (src): gd-2.0.36.RC1-52.32.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): gd-2.0.36.RC1-52.32.1
SUSE-SU-2017:0468-1: An update that fixes 6 vulnerabilities is now available. Category: security (moderate) Bug References: 1022263,1022264,1022265,1022283,1022284,1022553 CVE References: CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-6906,CVE-2016-6912,CVE-2016-9317 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Workstation Extension 12-SP1 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Server 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Server 12-SP1 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Desktop 12-SP2 (src): gd-2.1.0-23.1 SUSE Linux Enterprise Desktop 12-SP1 (src): gd-2.1.0-23.1
SUSE-SU-2017:0534-1: An update that fixes 13 vulnerabilities is now available. Category: security (important) Bug References: 1008026,1019547,1019550,1019568,1019570,1022219,1022255,1022257,1022260,1022262,1022263,1022264,1022265 CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10162,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478,CVE-2016-7479,CVE-2016-7480,CVE-2016-9138,CVE-2017-5340 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): php7-7.0.7-35.1 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): php7-7.0.7-35.1 SUSE Linux Enterprise Module for Web Scripting 12 (src): php7-7.0.7-35.1
openSUSE-SU-2017:0548-1: An update that fixes 6 vulnerabilities is now available. Category: security (moderate) Bug References: 1022263,1022264,1022265,1022283,1022284,1022553 CVE References: CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-6906,CVE-2016-6912,CVE-2016-9317 Sources used: openSUSE Leap 42.2 (src): gd-2.1.0-16.1 openSUSE Leap 42.1 (src): gd-2.1.0-19.1
SUSE-SU-2017:0556-1: An update that fixes 8 vulnerabilities is now available. Category: security (important) Bug References: 1019550,1022219,1022255,1022257,1022260,1022263,1022264,1022265 CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): php5-5.5.14-96.1 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): php5-5.5.14-96.1 SUSE Linux Enterprise Module for Web Scripting 12 (src): php5-5.5.14-96.1
SUSE-SU-2017:0568-1: An update that fixes 8 vulnerabilities is now available. Category: security (important) Bug References: 1019550,1022219,1022255,1022257,1022260,1022263,1022264,1022265 CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478 Sources used: SUSE OpenStack Cloud 5 (src): php53-5.3.17-101.1 SUSE Manager Proxy 2.1 (src): php53-5.3.17-101.1 SUSE Manager 2.1 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Software Development Kit 11-SP4 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Server 11-SP4 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): php53-5.3.17-101.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): php53-5.3.17-101.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): php53-5.3.17-101.1
openSUSE-SU-2017:0588-1: An update that fixes 13 vulnerabilities is now available. Category: security (important) Bug References: 1008026,1019547,1019550,1019568,1019570,1022219,1022255,1022257,1022260,1022262,1022263,1022264,1022265 CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10162,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478,CVE-2016-7479,CVE-2016-7480,CVE-2016-9138,CVE-2017-5340 Sources used: openSUSE Leap 42.2 (src): php7-7.0.7-12.1
released
This is an autogenerated message for OBS integration: This bug (1022264) was mentioned in https://build.opensuse.org/request/show/510888 Factory / gd