[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1N0GBt-00055o-Na@titan.mandriva.com>
Date: Tue, 20 Oct 2009 17:00:01 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2009:284 ] gd
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:284
http://www.mandriva.com/security/
_______________________________________________________________________
Package : gd
Date : October 20, 2009
Affected: 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
Enterprise Server 5.0, Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in gd:
The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.0, and the
GD Graphics Library 2.x, does not properly verify a certain colorsTotal
structure member, which might allow remote attackers to conduct
buffer overflow or buffer over-read attacks via a crafted GD file,
a different vulnerability than CVE-2009-3293. NOTE: some of these
details are obtained from third party information (CVE-2009-3546).
This update fixes this vulnerability.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2009.0:
6c866bae01f25d5dc270d3adbbd5d993 2009.0/i586/gd-utils-2.0.35-6.1mdv2009.0.i586.rpm
bd8887aeba9889fcdcb2cda16a6a53de 2009.0/i586/libgd2-2.0.35-6.1mdv2009.0.i586.rpm
88e7ebdf94c3493e816ffd512a2807a1 2009.0/i586/libgd-devel-2.0.35-6.1mdv2009.0.i586.rpm
d053ec9518ec742e3bc36353337b686d 2009.0/i586/libgd-static-devel-2.0.35-6.1mdv2009.0.i586.rpm
754f5c9783f4b5f7b1b117b18cca15d6 2009.0/SRPMS/gd-2.0.35-6.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64:
c8ea9db1a2900f0bf6126322df6516c3 2009.0/x86_64/gd-utils-2.0.35-6.1mdv2009.0.x86_64.rpm
ce2d31ad700733f16bae12aa67a7e7ef 2009.0/x86_64/lib64gd2-2.0.35-6.1mdv2009.0.x86_64.rpm
e5930aa4e9470a02c2d3ed35a9de8157 2009.0/x86_64/lib64gd-devel-2.0.35-6.1mdv2009.0.x86_64.rpm
a65dc17ce7c3814423c7274edd58d105 2009.0/x86_64/lib64gd-static-devel-2.0.35-6.1mdv2009.0.x86_64.rpm
754f5c9783f4b5f7b1b117b18cca15d6 2009.0/SRPMS/gd-2.0.35-6.1mdv2009.0.src.rpm
Mandriva Linux 2009.1:
05f81dc2f0895b4a3466cd855e43d4de 2009.1/i586/gd-utils-2.0.35-8.1mdv2009.1.i586.rpm
f52e6f8eb0bd1ef751ac64eeffe514ac 2009.1/i586/libgd2-2.0.35-8.1mdv2009.1.i586.rpm
55d6d5fce499049e0f06f8e98e4bbfe2 2009.1/i586/libgd-devel-2.0.35-8.1mdv2009.1.i586.rpm
546237c9a13ad9ee1abfe59f70fb79fd 2009.1/i586/libgd-static-devel-2.0.35-8.1mdv2009.1.i586.rpm
35226b6d2166537c4b797fb2f031fbeb 2009.1/SRPMS/gd-2.0.35-8.1mdv2009.1.src.rpm
Mandriva Linux 2009.1/X86_64:
de8bdbcb765b3db98246ded84df3d247 2009.1/x86_64/gd-utils-2.0.35-8.1mdv2009.1.x86_64.rpm
b20cc886a69f5bea68421326db8a881e 2009.1/x86_64/lib64gd2-2.0.35-8.1mdv2009.1.x86_64.rpm
4163f9180cfbd869f8e1309df343f739 2009.1/x86_64/lib64gd-devel-2.0.35-8.1mdv2009.1.x86_64.rpm
3b55d54e9428b159a707321717ad93c8 2009.1/x86_64/lib64gd-static-devel-2.0.35-8.1mdv2009.1.x86_64.rpm
35226b6d2166537c4b797fb2f031fbeb 2009.1/SRPMS/gd-2.0.35-8.1mdv2009.1.src.rpm
Corporate 3.0:
403f12a5a250eb7b19747e98acca455a corporate/3.0/i586/gd-utils-2.0.15-4.3.C30mdk.i586.rpm
63236e5b8c12a00613db49d7efbaf219 corporate/3.0/i586/libgd2-2.0.15-4.3.C30mdk.i586.rpm
2413a31873e5a12de7f91b9813edceac corporate/3.0/i586/libgd2-devel-2.0.15-4.3.C30mdk.i586.rpm
3c790eb64d13da72fd5233b231a37048 corporate/3.0/i586/libgd2-static-devel-2.0.15-4.3.C30mdk.i586.rpm
e53ea6c39ecf645109440a1b6d766753 corporate/3.0/SRPMS/gd-2.0.15-4.3.C30mdk.src.rpm
Corporate 3.0/X86_64:
b9ed91e59a55df1ca59f4982d1cf38e7 corporate/3.0/x86_64/gd-utils-2.0.15-4.3.C30mdk.x86_64.rpm
0e7b3b8f25571fd79f7a618ba14095b7 corporate/3.0/x86_64/lib64gd2-2.0.15-4.3.C30mdk.x86_64.rpm
b3fee4c8dac6089c5da355e505c3b54e corporate/3.0/x86_64/lib64gd2-devel-2.0.15-4.3.C30mdk.x86_64.rpm
74cd55856ed0275d795db3f7ae5b6081 corporate/3.0/x86_64/lib64gd2-static-devel-2.0.15-4.3.C30mdk.x86_64.rpm
e53ea6c39ecf645109440a1b6d766753 corporate/3.0/SRPMS/gd-2.0.15-4.3.C30mdk.src.rpm
Corporate 4.0:
2c26534467a1c98718bc2bb20e54bcab corporate/4.0/i586/gd-utils-2.0.33-3.6.20060mlcs4.i586.rpm
59601ba68440a1b0fd34c418d6c4716b corporate/4.0/i586/libgd2-2.0.33-3.6.20060mlcs4.i586.rpm
feaaa0d30efbfded9b2423bd843449d5 corporate/4.0/i586/libgd2-devel-2.0.33-3.6.20060mlcs4.i586.rpm
ca9df591a9e6e6df86573ea89f1d12dc corporate/4.0/i586/libgd2-static-devel-2.0.33-3.6.20060mlcs4.i586.rpm
eae43b418d8217f8a1525a6d9708104b corporate/4.0/SRPMS/gd-2.0.33-3.6.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
41af6c4d472865a1980f10f0b23f5d02 corporate/4.0/x86_64/gd-utils-2.0.33-3.6.20060mlcs4.x86_64.rpm
0f3cb929bf45c233a2fc79a21065f259 corporate/4.0/x86_64/lib64gd2-2.0.33-3.6.20060mlcs4.x86_64.rpm
f6a11970d270993097348cb3572db65c corporate/4.0/x86_64/lib64gd2-devel-2.0.33-3.6.20060mlcs4.x86_64.rpm
febdcbf9b32675bbde080713fd2084f1 corporate/4.0/x86_64/lib64gd2-static-devel-2.0.33-3.6.20060mlcs4.x86_64.rpm
eae43b418d8217f8a1525a6d9708104b corporate/4.0/SRPMS/gd-2.0.33-3.6.20060mlcs4.src.rpm
Mandriva Enterprise Server 5:
1db0eb2e2b696a31f830b4947cf6a89e mes5/i586/gd-utils-2.0.35-6.1mdvmes5.i586.rpm
e3817498bf992e5f0b5e51ee60c65211 mes5/i586/libgd2-2.0.35-6.1mdvmes5.i586.rpm
28baee14f1cc077348f61662ff4ea28b mes5/i586/libgd-devel-2.0.35-6.1mdvmes5.i586.rpm
c9e3fbe28c80b703e99db1a04f80e91d mes5/i586/libgd-static-devel-2.0.35-6.1mdvmes5.i586.rpm
f8d52f8fa6f2293104e0f7efe1f7813d mes5/SRPMS/gd-2.0.35-6.1mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64:
9429f44d43fd99c47aab8b6c0a7224ee mes5/x86_64/gd-utils-2.0.35-6.1mdvmes5.x86_64.rpm
4eabccefa3e38ac1047a563bfbc9176f mes5/x86_64/lib64gd2-2.0.35-6.1mdvmes5.x86_64.rpm
607e283d1361a2a96321dc0379694a82 mes5/x86_64/lib64gd-devel-2.0.35-6.1mdvmes5.x86_64.rpm
b3cad5c4e74f33f80084dfcd39c15066 mes5/x86_64/lib64gd-static-devel-2.0.35-6.1mdvmes5.x86_64.rpm
f8d52f8fa6f2293104e0f7efe1f7813d mes5/SRPMS/gd-2.0.35-6.1mdvmes5.src.rpm
Multi Network Firewall 2.0:
4747f4e4dc27468a95042588e404408f mnf/2.0/i586/gd-utils-2.0.15-4.3.C30mdk.i586.rpm
f6db5567845a718254f7f46780405121 mnf/2.0/i586/libgd2-2.0.15-4.3.C30mdk.i586.rpm
564143eee8ea15f96bec0c87c0585067 mnf/2.0/i586/libgd2-devel-2.0.15-4.3.C30mdk.i586.rpm
b3eb34d29849cdb83ebc658c616e7634 mnf/2.0/i586/libgd2-static-devel-2.0.15-4.3.C30mdk.i586.rpm
bb33f217b6c18e6e9076a235ace81cab mnf/2.0/SRPMS/gd-2.0.15-4.3.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFK3aKmmqjQ0CJFipgRAqYIAJ0fT+c75BABM3LmtAWj1oVw0ggHIQCg6t/v
FOF1M3BzT783w/39eoTYZTc=
=2yng
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists