Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in GD (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in GD (Aktualisierung)
ID: USN-4316-2
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 ESM
Datum: Fr, 3. April 2020, 07:32
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038
Applikationen: gd
Update von: Zwei Probleme in GD

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============1430454729687427858==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="0fGScfev8qDTJNOtvaLPRnaIY2RlqeO2R"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--0fGScfev8qDTJNOtvaLPRnaIY2RlqeO2R
Content-Type: multipart/mixed;
boundary="RQGdeSYQIIQ711Ap412EI2gnLhGb1K1T5"

--RQGdeSYQIIQ711Ap412EI2gnLhGb1K1T5
Content-Type: multipart/alternative;
boundary="------------505BBBD36D8265AF4F586017"
Content-Language: en-US

This is a multi-part message in MIME format.
--------------505BBBD36D8265AF4F586017
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4316-2
April 02, 2020

libgd2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in GD Graphics Library.

Software Description:
- libgd2: Open source code library for the dynamic creation of images

Details:

USN-4316-1 fixed a vulnerability in GD Graphics Library. This update
provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that GD Graphics Library incorrectly handled cloning an
image. An attacker could possibly use this issue to cause GD Graphics
Library
to crash, resulting in a denial of service. (CVE-2018-14553)

It was discovered that GD Graphics Library incorrectly handled loading
images
from X bitmap format files. An attacker could possibly use this issue to
cause
GD Graphics Library to crash, resulting in a denial of service, or to
disclose
contents of the stack that has been left there by previous code.
(CVE-2019-11038)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
libgd-tools 2.1.0-3ubuntu0.11+esm1
libgd3 2.1.0-3ubuntu0.11+esm1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4316-2
https://usn.ubuntu.com/4316-1
CVE-2018-14553, CVE-2019-11038

--------------505BBBD36D8265AF4F586017
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html>
<head>

<meta http-equiv=3D"Content-Type" content=3D"text/html;
charset=3DUTF=
-8">
</head>
<body>
<p><span class=3D"im" style=3D"font-style: normal;
font-variant-ligatures: normal; font-variant-caps: normal;
font-weight: 400; letter-spacing: normal; text-align: start;
text-indent: 0px; text-transform: none; white-space: normal;
word-spacing: 0px; -webkit-text-stroke-width: 0px;
text-decoration-style: initial; text-decoration-color: initial;
font-family: Arial, Helvetica, sans-serif; font-size: small;
background-color: rgb(255, 255,
255);">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D
=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
Ubuntu Security Notice USN-4316-2<br>
April 02, 2020<br>
<br>
libgd2 vulnerabilities<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D
=
=3D=3D=3D=3D=3D=3D<br>
<br>
A security issue affects these releases of Ubuntu and its
derivatives:<br>
<br>
- Ubuntu 14.04 ESM<br>
<br>
Summary:<br>
<br>
Several security issues were fixed in GD Graphics Library.<br>
<br>
Software Description:<br>
- libgd2: Open source code library for the dynamic creation of
images<br>
<br>
Details:<br>
<br>
USN-4316-1 fixed a vulnerability in GD Graphics Library. This
update provides<br>
the corresponding update for Ubuntu 14.04 ESM.<br>
<br>
Original advisory details:<br>
<br>
It was discovered that GD Graphics Library incorrectly handled
cloning an<br>
image. An attacker could possibly use this issue to cause GD
Graphics Library<br>
to crash, resulting in a denial of service. (CVE-2018-14553)<br>
<br>
It was discovered that GD Graphics Library incorrectly handled
loading images<br>
from X bitmap format files. An attacker could possibly use this
issue to cause<br>
GD Graphics Library to crash, resulting in a denial of service,
or to disclose<br>
</span><span style=3D"font-style: normal;
font-variant-ligatures:
normal; font-variant-caps: normal; font-weight: 400;
letter-spacing: normal; text-align: start; text-indent: 0px;
text-transform: none; white-space: normal; word-spacing: 0px;
-webkit-text-stroke-width: 0px; text-decoration-style: initial;
text-decoration-color: initial; font-family: Arial, Helvetica,
sans-serif; font-size: small; background-color: rgb(255, 255,
255);">contents of the stack that has been left there by
previous code. (CVE-2019-11038)</span><br>
</p>
<div class=3D"HOEnZb adL" style=3D"font-style: normal;
font-variant-ligatures: normal; font-variant-caps: normal;
font-weight: 400; letter-spacing: normal; orphans: 2; text-align:
start; text-indent: 0px; text-transform: none; white-space:
normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width:
0px; text-decoration-style: initial; text-decoration-color:
initial; color: rgb(34, 34, 34); font-family: Arial, Helvetica,
sans-serif; font-size: small; background-color: rgb(255, 255,
255);">
<div class=3D"im" style=3D"color: rgb(80, 0, 80);">
<p><font color=3D"#000000">Update
instructions:</font></p>
<font color=3D"#000000">The problem can be corrected by
updating
your system to the following<br>
package versions:<br>
<br>
Ubuntu 14.04 ESM:<br>
=C2=A0 libgd-tools=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A02.1.0-3ubuntu0.11+esm1<br>
=C2=A0 libgd3=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 2.1.0-3ubuntu0.11+esm1<br>
<br>
In general, a standard system update will make all the
necessary changes.<br>
<br>
References:</font><br>
=C2=A0=C2=A0<a href=3D"https://usn.ubuntu.com/4316-2" rel=3D"nore=
ferrer"
target=3D"_blank"
data-saferedirecturl=3D"https://www.google.com/url?q=3Dhttps://usn.ubuntu=
=2Ecom/4316-2&amp;source=3Dgmail&amp;ust=3D1585953507706000&amp;usg=3DAFQ
=
jCNHDzSQUN-OSlWvV-qIQ67Xc6W4Q0A"
style=3D"color: rgb(17, 85, 204);">https://usn.ubuntu.com/4316-=
2</a><br>
=C2=A0=C2=A0<a href=3D"https://usn.ubuntu.com/4316-1" rel=3D"nore=
ferrer"
target=3D"_blank"
data-saferedirecturl=3D"https://www.google.com/url?q=3Dhttps://usn.ubuntu=
=2Ecom/4316-1&amp;source=3Dgmail&amp;ust=3D1585953507706000&amp;usg=3DAFQ
=
jCNHxPWJg3eGQwLhBWgU_85mavMoYrQ"
style=3D"color: rgb(17, 85, 204);">https://usn.ubuntu.com/4316-=
1</a><br>
<font color=3D"#000000">=C2=A0 CVE-2018-14553,
CVE-2019-11038</fo=
nt></div>
</div>
</body>
</html>

--------------505BBBD36D8265AF4F586017--

--RQGdeSYQIIQ711Ap412EI2gnLhGb1K1T5--

--0fGScfev8qDTJNOtvaLPRnaIY2RlqeO2R
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEElnO/d49FoUPK9fwytGdj0GOh2+wFAl6GbBAACgkQtGdj0GOh
2+xjqwf9FDb99jwXoJJve7gvv1tPpu9ju5/BshJRjcTAqta9R8MRNnaK0ihDCcPg
pVvGct8aUmhG6SSIw4HGq/cI24tfdbUH4j1HtgycUHCQlAgHMPml6DaCWVRuO+DS
zeA9hv5gjjbJ10nOB24+DDrxxKdL9FUzHbcTcmGSsEBax2S2N6i9eFKBgCUq/3D7
BO81F3aAlZwSSgGDN33/OO1kEqot6ymEjvBuEf3qSbkCp6gdlfAOB5ywm3gxufq3
lePBPQwoSyoICj9X2qunKZDiNU2KxaC7XYpvgk99vB8gbfZaTP4cxiCc5/w9x+ce
PLZrt2MgOTNtayTYP19tgZLqqnNjBg==
=UQUF
-----END PGP SIGNATURE-----

--0fGScfev8qDTJNOtvaLPRnaIY2RlqeO2R--


--===============1430454729687427858==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============1430454729687427858==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung