Mehrere Probleme in gd
ID: | SSA:2020-083-01 |
Distribution: | Slackware |
Plattformen: | Slackware -current, Slackware x86_64 -current, Slackware 14.2, Slackware x86_64 14.2 |
Datum: | Mo, 23. März 2020, 23:19 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222 |
Applikationen: | gd |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] gd (SSA:2020-083-01) New gd packages are available for Slackware 14.2 and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/gd-2.3.0-i586-1_slack14.2.txz: Upgraded. This update fixes bugs and security issues: Potential double-free in gdImage*Ptr(). gdImageColorMatch() out of bounds write on heap. Uninitialized read in gdImageCreateFromXbm(). Double-free in gdImageBmp. Potential NULL pointer dereference in gdImageClone(). Potential infinite loop in gdImageCreateFromGifCtx(). For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/gd-2.3.0-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/gd-2.3.0-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/gd-2.3.0-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/gd-2.3.0-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.2 package: 02054b210ea398c39294503cfd96932a gd-2.3.0-i586-1_slack14.2.txz Slackware x86_64 14.2 package: b9de5217fd1c323ece6c42d59118f611 gd-2.3.0-x86_64-1_slack14.2.txz Slackware -current package: 073b5aa2f29173ac3549a55fae397a78 l/gd-2.3.0-i586-1.txz Slackware x86_64 -current package: ada8d37a3346d51cf1b773c01cbca8ce l/gd-2.3.0-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg gd-2.3.0-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iEYEARECAAYFAl55FmoACgkQakRjwEAQIjO8YgCdEAQiLSvd05IBe8Nw4ljSdBmF HPQAn14e3ZZ0/JuXyjEjFwgLJjhJW33B =B9+Y -----END PGP SIGNATURE----- |