what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 37264

Secunia Security Advisory 37264
Posted Nov 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libgd2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | 6d0f897a0ff4836176ee5efcca213fdee20e9b7c6c53993ade53cb108c28b0e0

Secunia Security Advisory 37264

Change Mirror Download
----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability
intelligence source on the market.

Implement it through Secunia.

For more information visit:
http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com

----------------------------------------------------------------------

TITLE:
Ubuntu update for libgd2

SECUNIA ADVISORY ID:
SA37264

VERIFY ADVISORY:
http://secunia.com/advisories/37264/

DESCRIPTION:
Ubuntu has issued an update for libgd2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) or potentially compromise an application
using the library.

For more information:
SA25855
SA36791
SA37069

SOLUTION:
Apply updated packages.

-- Ubuntu 6.06 LTS --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-2ubuntu5.4.diff.gz
Size/MD5: 258547 04046c5a93a087f4f5ade0055bbf22cb
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-2ubuntu5.4.dsc
Size/MD5: 973 c7ce6a684cc67dbc69f03e03b54b51b2
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz
Size/MD5: 587617 be0a6d326cd8567e736fbc75df0a5c45

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-dev_2.0.33-2ubuntu5.4_all.deb
Size/MD5: 129774 a31ad9eacfd696ffe3fdef93acef73c3
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd2_2.0.33-2ubuntu5.4_all.deb
Size/MD5: 129750 4d8c0ad2d083e789d953e6182d078ef4

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 341658 4561d10b25acda7165cd538d88a9e5a9
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 200492 e6457ffbe31f4e546d4484d5bd1bc2ed
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 343380 0d023589f24ca1a95040993d1d4a30c1
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 202212 7cec8f0bc8704d35e453eb2b07a21e01
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.4_amd64.deb
Size/MD5: 143136 f438666205ada39092897b6e959345d8

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 331210 a0480de5209f2e66de2164997c3bcb25
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 193572 b195270648b35995a62b1887995e4025
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 331984 a1a1c0b922638f2adcbd86188f689df1
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 195218 100b604eb7ada1ac48c38fddaeeee7d5
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.4_i386.deb
Size/MD5: 142190 8cb1e1126490d20129355cea61535cea

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 342796 c1bf1b5a00916f51d60266cac243d152
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 200630 20f64b15460b57ed8f76758eea5b22a7
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 344696 b5eb207979cea4e3f29101177591599c
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 202184 ddf0bf913ff41c27fbf635dfe26fe34e
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.4_powerpc.deb
Size/MD5: 151384 574ab21f61657b6c713c917d98636c83

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 334374 672949b6e6eed63db0372617b9c62b69
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 194718 bc9eaf1f8bde7c9de9eb946c55c54883
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 335598 b27bef38e70d8b2895346b4b8d89a6c9
http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 196614 92e83e3d10c5c9803df672fd86ba8f1e
http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.4_sparc.deb
Size/MD5: 142438 5a968a81069fe918ad28bfa21c4b1c1b

ORIGINAL ADVISORY:
USN-854-1:
http://www.ubuntu.com/usn/USN-854-1

OTHER REFERENCES:
SA25855:
http://secunia.com/advisories/25855/

SA36791:
http://secunia.com/advisories/36791/

SA37069:
http://secunia.com/advisories/37069/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close