==========================================================================
Ubuntu Security Notice USN-3410-1
September 05, 2017
libgd2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
GD library could be made to crash if it opened a specially crafted
file.
Software Description:
– libgd2: GD Graphics Library
Details:
It was discovered a double-free vulnerability in GD library.
A remote attacker could write arbitrary values in memory
spaces or made programs to crash.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libgd-tools 2.2.4-2ubuntu0.3
libgd3 2.2.4-2ubuntu0.3
Ubuntu 16.04 LTS:
libgd-tools 2.1.1-4ubuntu0.16.04.8
libgd3 2.1.1-4ubuntu0.16.04.8
Ubuntu 14.04 LTS:
libgd-tools 2.1.0-3ubuntu0.8
libgd3 2.1.0-3ubuntu0.8
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3410-1
CVE-2017-6362
Package Information:
https://launchpad.net/ubuntu/+source/libgd2/2.2.4-2ubuntu0.3
https://launchpad.net/ubuntu/+source/libgd2/2.1.1-4ubuntu0.16.04.8
https://launchpad.net/ubuntu/+source/libgd2/2.1.0-3ubuntu0.8
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=1Xsn
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3410-2
September 05, 2017
libgd2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 ESM
Summary:
GD library could be made to crash if it opened a specially crafted
file.
Software Description:
– libgd2: GD Graphics Library
Details:
USN-3410-1 fixed a vulnerability in GD Graphics Library.
This update provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that the GD Graphics Library (aka libgd) incorrectly
handled certain malformed PNG images. A remote attacker could use this
issue to cause the GD Graphics Library to crash, resulting in a denial
of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
libgd-tools 2.0.36~rc1~dfsg-6ubuntu2.6
libgd2-noxpm 2.0.36~rc1~dfsg-6ubuntu2.6
libgd2-xpm 2.0.36~rc1~dfsg-6ubuntu2.6
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3410-2
https://www.ubuntu.com/usn/usn-3410-1
CVE-2017-6362
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=zLMx
—–END PGP SIGNATURE—–
—