Secunia Security Advisory - Ubuntu has issued an update for libgd2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.
6d0f897a0ff4836176ee5efcca213fdee20e9b7c6c53993ade53cb108c28b0e0
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Ubuntu update for libgd2
SECUNIA ADVISORY ID:
SA37264
VERIFY ADVISORY:
http://secunia.com/advisories/37264/
DESCRIPTION:
Ubuntu has issued an update for libgd2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) or potentially compromise an application
using the library.
For more information:
SA25855
SA36791
SA37069
SOLUTION:
Apply updated packages.
-- Ubuntu 6.06 LTS --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-2ubuntu5.4.diff.gz
Size/MD5: 258547 04046c5a93a087f4f5ade0055bbf22cb
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-2ubuntu5.4.dsc
Size/MD5: 973 c7ce6a684cc67dbc69f03e03b54b51b2
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz
Size/MD5: 587617 be0a6d326cd8567e736fbc75df0a5c45
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-dev_2.0.33-2ubuntu5.4_all.deb
Size/MD5: 129774 a31ad9eacfd696ffe3fdef93acef73c3
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd2_2.0.33-2ubuntu5.4_all.deb
Size/MD5: 129750 4d8c0ad2d083e789d953e6182d078ef4
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 341658 4561d10b25acda7165cd538d88a9e5a9
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 200492 e6457ffbe31f4e546d4484d5bd1bc2ed
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 343380 0d023589f24ca1a95040993d1d4a30c1
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 202212 7cec8f0bc8704d35e453eb2b07a21e01
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 143136 f438666205ada39092897b6e959345d8
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 331210 a0480de5209f2e66de2164997c3bcb25
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 193572 b195270648b35995a62b1887995e4025
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 331984 a1a1c0b922638f2adcbd86188f689df1
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 195218 100b604eb7ada1ac48c38fddaeeee7d5
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 142190 8cb1e1126490d20129355cea61535cea
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 342796 c1bf1b5a00916f51d60266cac243d152
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 200630 20f64b15460b57ed8f76758eea5b22a7
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 344696 b5eb207979cea4e3f29101177591599c
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 202184 ddf0bf913ff41c27fbf635dfe26fe34e
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 151384 574ab21f61657b6c713c917d98636c83
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 334374 672949b6e6eed63db0372617b9c62b69
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 194718 bc9eaf1f8bde7c9de9eb946c55c54883
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 335598 b27bef38e70d8b2895346b4b8d89a6c9
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 196614 92e83e3d10c5c9803df672fd86ba8f1e
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 142438 5a968a81069fe918ad28bfa21c4b1c1b
ORIGINAL ADVISORY:
USN-854-1:
http://www.ubuntu.com/usn/USN-854-1
OTHER REFERENCES:
SA25855:
http://secunia.com/advisories/25855/
SA36791:
http://secunia.com/advisories/36791/
SA37069:
http://secunia.com/advisories/37069/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------