Slackware Security Advisories
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] gd (SSA:2020-083-01)
Date: Mon, 23 Mar 2020 13:45:50 -0700 (PDT)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  gd (SSA:2020-083-01)

New gd packages are available for Slackware 14.2 and -current to
fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/gd-2.3.0-i586-1_slack14.2.txz:  Upgraded.
  This update fixes bugs and security issues:
  Potential double-free in gdImage*Ptr().
  gdImageColorMatch() out of bounds write on heap.
  Uninitialized read in gdImageCreateFromXbm().
  Double-free in gdImageBmp.
  Potential NULL pointer dereference in gdImageClone().
  Potential infinite loop in gdImageCreateFromGifCtx().
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/gd-2.3.0-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/gd-2.3.0-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/gd-2.3.0-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/gd-2.3.0-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.2 package:
02054b210ea398c39294503cfd96932a  gd-2.3.0-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
b9de5217fd1c323ece6c42d59118f611  gd-2.3.0-x86_64-1_slack14.2.txz

Slackware -current package:
073b5aa2f29173ac3549a55fae397a78  l/gd-2.3.0-i586-1.txz

Slackware x86_64 -current package:
ada8d37a3346d51cf1b773c01cbca8ce  l/gd-2.3.0-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg gd-2.3.0-i586-1_slack14.2.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAl55FmoACgkQakRjwEAQIjO8YgCdEAQiLSvd05IBe8Nw4ljSdBmF
HPQAn14e3ZZ0/JuXyjEjFwgLJjhJW33B
=B9+Y
-----END PGP SIGNATURE-----

Slackware™ is a trademark of Patrick Volkerding.