User: Password:
|
|
Subscribe / Log in / New account

Debian alert DSA-1117-1 (libgd2)

From:  Moritz Muehlenhoff <jmm@debian.org>
To:  debian-security-announce@lists.debian.org
Subject:  [SECURITY] [DSA 1117-1] New libgd2 packages fix denial of service
Date:  Fri, 21 Jul 2006 18:19:08 +0200

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1117-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff July 21st, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : libgd2 Vulnerability : insufficient input sanitising Problem-Type : local(remote) Debian-specific: no CVE ID : CVE-2006-2906 Debian Bug : 372912 It was discoverd that the GD graphics library performs insufficient checks of the validity of GIF images, which might lead to denial of service by tricking the application into an infinite loop. For the stable distribution (sarge) this problem has been fixed in version 2.0.33-1.1sarge1. For the unstable distribution (sid) this problem has been fixed in version 2.0.33-5. We recommend that you upgrade your libgd2 packages. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 885 e389163781898504ec6e8e0018cd1fdd http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 260955 50e0aa54bda19f06041d78a5771c7fd1 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 587617 be0a6d326cd8567e736fbc75df0a5c45 Architecture independent components: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 128526 bcaaacf60733a35002b999f8851ce3a7 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 128500 4ef28350291c173754332cc61cb54ba1 Alpha architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 144914 65aa478f07315cb7e62ac6d91177b96d http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 206668 8cded1b036579ebc7c62f1ac37824ac6 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 357800 cc21def16f0e514da5d34c2f513b3daf http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 208490 fa17839a6953dbd709eda8783be6ead1 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 362160 0be347a2217d06fe7ef36b002ea7c9ca AMD64 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 141774 1f54d14b016a5ad132998ff669226244 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 196436 6ff8e6d85237e34ddd12c9aea85bd314 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 337310 bfd77a6cdc6aaa1c64d6c4be1a8acea8 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 198932 a084415f7c3dfc684569d626dd80aacb http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 340294 8fdc6f33e6253346c4f853db61501a21 ARM architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 141374 b157ca4d44fffd20740c162535ca9e3f http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 188664 5b3a0e8dcb02e3fa83cb8a618a57c456 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 334316 74999431b3008c7f4820d0405a236c0f http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 191308 b29466e1a38e863dce0b1cdb535e3cfc http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 337536 761e0550e4d9343d2056dba350c1cd1f Intel IA-32 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 141786 1cc957c1d1cb93e2d80c85d0c84dcfd1 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 191932 f66bc591f047503e80d107458e938416 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 328576 27953838b048aab48d4eee40fc630f6f http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 193690 580d72764e8b331f9be599b45894497d http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 330848 0c980ae4c5a0e93725175e69c7d8176f Intel IA-64 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 146290 a07f3ae8f234ca3e3b5e81eebf3c446d http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 224272 c057fe07156af1945b9eab8909a28bec http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 370376 6f8485a4f4d916d75dc21b20a113ad98 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 227040 4983686be756f0fdd7ab03cf1cc9c195 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 373400 896aaaaec2747772779073c837fe2d84 HP Precision architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 143562 c4223c693e1a24336ddab5a92e3d019b http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 204504 371343c96979ae3b6688a9471333dd20 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 345608 267ea3ea2dedc6b7d1b991821eff0327 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 207026 ad942c88f11286a44e9aac850fb10a3a http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 348272 926ac97ade522d92be98fd0035536c45 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 141456 1477bf288e99fa9bdf1640c828d7f1a5 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 184864 9cde2fe10257ecaf581300e024dd7f0c http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 323520 634a13523c02c7b831228c128fe320c8 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 187018 b6fcadf304e52fa9e57ceb168e495156 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 325634 44468789f4014425c7c84c62fdb07914 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 155774 5af80762b00f46f1f9fdc46a78941191 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 195396 c10d28c9f999639745c04889c0581516 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 344960 0b3bc47908a4f25ebb58b27c5e6fa730 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 198016 9fe5be1930a8f9ff4ab15b09aff626fb http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 347410 da9fb9aeb4c9891cb5dec62ca9263aaa Little endian MIPS architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 155772 58c478bc430bd49cece6e748218e6200 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 195330 ca975af25d3362ce4a4c9e19b1d27b50 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 344992 096e665346647e297e943684e7222e5f http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 197846 660f0ba2f884e249d5ffd7302f398a01 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 347270 69c4a6744e74455997a8228566a47f00 PowerPC architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 150276 46c99b85b1faf609147cc111b747841d http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 198830 c8168aa92f4008e2943893fa5ccae820 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 341538 505e633e80f425c8b9422e83997ac07c http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 200916 16d8a96a3fc3b28a7355680fedaef3e8 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 344206 47c92a9a5bbc22637f5fee0223034a97 IBM S/390 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 142414 a30ad94d6ca809d519a088771b31fc1d http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 199456 c99ca505a026d2b7b01dea1eaeebc4a5 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 337702 c45bca23bef2f03a03a6e07e37757281 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 202030 34639f38ecfed22b1b1887a918516dce http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 341264 c510662e0889b70e73b8e76c568009e6 Sun Sparc architecture: http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 141382 71ccad065f8a4a21ee8337537e732b90 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 191428 aa0a6d650fb2eb6322d2582f7489ed73 http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 332436 26d15a5c68f2a47a5eccf4ba3b4980fb http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 194072 95aa9e357d5dd4f0105e1f7888b9bb4f http://security.debian.org/pool/updates/main/libg/libgd2/... Size/MD5 checksum: 334118 a6d05fae692cd60c72b231a78230a38a These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEwP4VXm3vHE4uyloRAmsZAKDNNtLkk8pu74ItZ+FiwvNBCh8XtgCgodBY aDbnxJJl5wHK/XslepqaJa0= =vPD4 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds