<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">gd-2.3.3-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10777</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">gd-2.3.3-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the gd-2.3.3-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10777</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10777</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-2756/</URL>
      <Description>SUSE CVE CVE-2007-2756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10166/</URL>
      <Description>SUSE CVE CVE-2016-10166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10167/</URL>
      <Description>SUSE CVE CVE-2016-10167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10168/</URL>
      <Description>SUSE CVE CVE-2016-10168 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6912/</URL>
      <Description>SUSE CVE CVE-2016-6912 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9317/</URL>
      <Description>SUSE CVE CVE-2016-9317 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6362/</URL>
      <Description>SUSE CVE CVE-2017-6362 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7890/</URL>
      <Description>SUSE CVE CVE-2017-7890 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000222/</URL>
      <Description>SUSE CVE CVE-2018-1000222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14553/</URL>
      <Description>SUSE CVE CVE-2018-14553 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5711/</URL>
      <Description>SUSE CVE CVE-2018-5711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11038/</URL>
      <Description>SUSE CVE CVE-2019-11038 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6977/</URL>
      <Description>SUSE CVE CVE-2019-6977 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6978/</URL>
      <Description>SUSE CVE CVE-2019-6978 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gd-2.3.3-1.1">
      <FullProductName ProductID="gd-2.3.3-1.1">gd-2.3.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gd-devel-2.3.3-1.1">
      <FullProductName ProductID="gd-devel-2.3.3-1.1">gd-devel-2.3.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gd-devel-32bit-2.3.3-1.1">
      <FullProductName ProductID="gd-devel-32bit-2.3.3-1.1">gd-devel-32bit-2.3.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgd3-2.3.3-1.1">
      <FullProductName ProductID="libgd3-2.3.3-1.1">libgd3-2.3.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgd3-32bit-2.3.3-1.1">
      <FullProductName ProductID="libgd3-32bit-2.3.3-1.1">libgd3-32bit-2.3.3-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gd-2.3.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gd-2.3.3-1.1">gd-2.3.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gd-devel-2.3.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gd-devel-2.3.3-1.1">gd-devel-2.3.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gd-devel-32bit-2.3.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1">gd-devel-32bit-2.3.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgd3-2.3.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgd3-2.3.3-1.1">libgd3-2.3.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgd3-32bit-2.3.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1">libgd3-32bit-2.3.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.</Note>
    </Notes>
    <CVE>CVE-2007-2756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-2756.html</URL>
        <Description>CVE-2007-2756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/276525</URL>
        <Description>SUSE Bug 276525</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/282730</URL>
        <Description>SUSE Bug 282730</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable.</Note>
    </Notes>
    <CVE>CVE-2016-10166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10166.html</URL>
        <Description>CVE-2016-10166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022069</URL>
        <Description>SUSE Bug 1022069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022263</URL>
        <Description>SUSE Bug 1022263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file.</Note>
    </Notes>
    <CVE>CVE-2016-10167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10167.html</URL>
        <Description>CVE-2016-10167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022069</URL>
        <Description>SUSE Bug 1022069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022264</URL>
        <Description>SUSE Bug 1022264</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.</Note>
    </Notes>
    <CVE>CVE-2016-10168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10168.html</URL>
        <Description>CVE-2016-10168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022069</URL>
        <Description>SUSE Bug 1022069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022265</URL>
        <Description>SUSE Bug 1022265</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the gdImageWebPtr function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via large width and height values.</Note>
    </Notes>
    <CVE>CVE-2016-6912</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6912.html</URL>
        <Description>CVE-2016-6912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022284</URL>
        <Description>SUSE Bug 1022284</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The gdImageCreate function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (system hang) via an oversized image.</Note>
    </Notes>
    <CVE>CVE-2016-9317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9317.html</URL>
        <Description>CVE-2016-9317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022283</URL>
        <Description>SUSE Bug 1022283</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the gdImagePngPtr function in libgd2 before 2.2.5 allows remote attackers to cause a denial of service via vectors related to a palette with no colors.</Note>
    </Notes>
    <CVE>CVE-2017-6362</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6362.html</URL>
        <Description>CVE-2017-6362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056993</URL>
        <Description>SUSE Bug 1056993</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.</Note>
    </Notes>
    <CVE>CVE-2017-7890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7890.html</URL>
        <Description>CVE-2017-7890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050241</URL>
        <Description>SUSE Bug 1050241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5.</Note>
    </Notes>
    <CVE>CVE-2018-1000222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000222.html</URL>
        <Description>CVE-2018-1000222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105434</URL>
        <Description>SUSE Bug 1105434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).</Note>
    </Notes>
    <CVE>CVE-2018-14553</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14553.html</URL>
        <Description>CVE-2018-14553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165471</URL>
        <Description>SUSE Bug 1165471</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.</Note>
    </Notes>
    <CVE>CVE-2018-5711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5711.html</URL>
        <Description>CVE-2018-5711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076391</URL>
        <Description>SUSE Bug 1076391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.</Note>
    </Notes>
    <CVE>CVE-2019-11038</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11038.html</URL>
        <Description>CVE-2019-11038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140118</URL>
        <Description>SUSE Bug 1140118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140120</URL>
        <Description>SUSE Bug 1140120</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.</Note>
    </Notes>
    <CVE>CVE-2019-6977</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6977.html</URL>
        <Description>CVE-2019-6977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123354</URL>
        <Description>SUSE Bug 1123354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123361</URL>
        <Description>SUSE Bug 1123361</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.</Note>
    </Notes>
    <CVE>CVE-2019-6978</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gd-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gd-devel-32bit-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-2.3.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgd3-32bit-2.3.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6978.html</URL>
        <Description>CVE-2019-6978</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123522</URL>
        <Description>SUSE Bug 1123522</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
