lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041115205906.GA22907@box79162.elkhouse.de>
From: martin.pitt at canonical.com (Martin Pitt)
Subject: [USN-25-1] libgd2 vulnerability

===========================================================
Ubuntu Security Notice USN-25-1		  November 15, 2004
libgd2 vulnerability
CAN-2004-0941
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

libgd2-noxpm
libgd2-xpm

The problem can be corrected by upgrading the affected package to
version 2.0.23-2ubuntu0.2.  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

CAN-2004-0990 described several more buffer overflows which had been
discovered in libgd2's PNG handling functions. However, it was
determined that the update from USN-11-1 was not sufficient to prevent
every possible attack, so another update is required.

If an attacker tricked a user into loading a malicious PNG image, they
could leverage this into executing arbitrary code in the context of
the user opening image. Most importantly, this library is commonly
used in PHP. One possible target would be a PHP driven photo website
that lets users upload images. Therefore this vulnerability might lead
to privilege escalation to a web server's privileges.

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.23-2ubuntu0.2.diff.gz
      Size/MD5:    12226 07b3dbcc7859c96fd9361ba5acb55ca3
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.23-2ubuntu0.2.dsc
      Size/MD5:      783 7af6efbf687a91f9ae5a3706dff6b4e2
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.23.orig.tar.gz
      Size/MD5:   544497 3bcd6daef3eb7b31ddc68a7d54b98c15

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-dev_2.0.23-2ubuntu0.2_all.deb
      Size/MD5:   111930 e02388104c787c629cdaf7359f4e0dd6
    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd2_2.0.23-2ubuntu0.2_all.deb
      Size/MD5:   111908 2babd3d434bae12783979f95a4adf00b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.23-2ubuntu0.2_amd64.deb
      Size/MD5:   128298 718b6351eab50fa26ec7352115df7dbc
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.23-2ubuntu0.2_amd64.deb
      Size/MD5:   305982 9d8c153eca642174db034475f635f876
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.23-2ubuntu0.2_amd64.deb
      Size/MD5:   171350 316969fbd3f4074e4529c1a86d27dc5a
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.23-2ubuntu0.2_amd64.deb
      Size/MD5:   305978 0ce7ed0d0064efb50b80744e27603393
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.23-2ubuntu0.2_amd64.deb
      Size/MD5:   171332 ec97c276edf3068a3ea339c6ba879e2a

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.23-2ubuntu0.2_i386.deb
      Size/MD5:   127402 1b5396bfedaa2834bb6eb6f634375068
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.23-2ubuntu0.2_i386.deb
      Size/MD5:   299968 cbbdbe2652350e2bc68b178a801b38f2
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.23-2ubuntu0.2_i386.deb
      Size/MD5:   167526 660bd677beaa8d38271659269917cb3a
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.23-2ubuntu0.2_i386.deb
      Size/MD5:   299956 77de1a155bc35a7f1e19401f34111c01
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.23-2ubuntu0.2_i386.deb
      Size/MD5:   167506 03f731943138914465c94673e71b458b

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.23-2ubuntu0.2_powerpc.deb
      Size/MD5:   134178 d7cae80497fdb38ad24889a5fcbd15af
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.23-2ubuntu0.2_powerpc.deb
      Size/MD5:   309086 42da3075045590245e629e590e484e15
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.23-2ubuntu0.2_powerpc.deb
      Size/MD5:   173336 d2600f9749dcf3fa290b83d2563bc8d1
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.23-2ubuntu0.2_powerpc.deb
      Size/MD5:   309068 33f9904e88d4661aece4c12d04a533cd
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.23-2ubuntu0.2_powerpc.deb
      Size/MD5:   173314 62620d7ed4283f1c7cb675a729a7ca4d

----- End forwarded message -----

-- 
Martin Pitt                       http://www.piware.de
Ubuntu Developer            http://www.ubuntulinux.org
Debian GNU/Linux Developer       http://www.debian.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041115/05cf9a4c/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ