exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3693-1

Debian Security Advisory 3693-1
Posted Oct 18, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3693-1 - Multiple vulnerabilities have been discovered in the GD Graphics Library, which may result in denial of service or potentially the execution of arbitrary code if a malformed file is processed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2016-7568
SHA-256 | 43a92cb5d9f6e62cc4a4da52fe265bff5e1b879505ae69e8fe593cf9645b422a

Debian Security Advisory 3693-1

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3693-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 14, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libgd2
CVE ID : CVE-2016-7568

Multiple vulnerabilities have been discovered in the GD Graphics Library,
which may result in denial of service or potentially the execution of
arbitrary code if a malformed file is processed.

For the stable distribution (jessie), this problem has been fixed in
version 2.1.0-5+deb8u7.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your libgd2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCAAGBQJYAUmSAAoJEBDCk7bDfE42jxgP/jAjVgmvMoJGraP8BRocOBNe
OgyWyLNY26lchlKjTufpOW3kM6c2anIh4CRHZt/YEpfOAuEl6oRKSBrOGxtJzGeV
/wmmrW7MNVmlSDSJlUSuWmvKlulVDY6LoMbnq/msODfJiUzedBNKndf0rKOb7VUQ
r+Phk9QM8lmfSHJOMwyY/emxfK4p56pn6lr3Adakdig2VKJeGrNp9B4OylAfDxfC
rSEVAWaydNf43zH90O0sEB2o0G1k4usimHB9oM3ivEg9rF/GUwhZoWw3U6Ljpedq
jeRVlsV2dR8HBVmOBcdGQnhQO6S8X3cEJwDBBQBrlP+t0mg/u3Tlkt37B0Mbnf8Z
xl/a+vbWWvAPHszx1gHsVQokQF3+wgI0/Seykkyw34mn1YO551/DW12SjHXUB7Mx
HsGbfyGi0zgMcLBmQ7Tz4qNsKwTCwBtQdo0nmj0cLtE+qboXdPaVKdsRxY5Vatz9
CdHXH4S5wPqKKtmwYGTf/8oHDno272wYbxTHzgkgqKfDFKOl1uD9aFQq3Ui7aUUz
WJ0ItGk2sUhNTuA190hQYR+leolBtIcvmv5rHcbANSQWJK9wGYfsthJ1uknjdjH1
/H7xbxfSrJMiynUZx333c+RUyAjhdYDoSzK0EQxBDsLto5NHfkGcLq/BzVQ7jn/L
AZF8gxIXkQKMXqk2wVeg
=9Veq
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close