This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============1430454729687427858== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="0fGScfev8qDTJNOtvaLPRnaIY2RlqeO2R"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --0fGScfev8qDTJNOtvaLPRnaIY2RlqeO2R Content-Type: multipart/mixed; boundary="RQGdeSYQIIQ711Ap412EI2gnLhGb1K1T5"
--RQGdeSYQIIQ711Ap412EI2gnLhGb1K1T5 Content-Type: multipart/alternative; boundary="------------505BBBD36D8265AF4F586017" Content-Language: en-US
This is a multi-part message in MIME format. --------------505BBBD36D8265AF4F586017 Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4316-2 April 02, 2020
libgd2 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in GD Graphics Library.
Software Description: - libgd2: Open source code library for the dynamic creation of images
Details:
USN-4316-1 fixed a vulnerability in GD Graphics Library. This update provides the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that GD Graphics Library incorrectly handled cloning an image. An attacker could possibly use this issue to cause GD Graphics Library to crash, resulting in a denial of service. (CVE-2018-14553)
It was discovered that GD Graphics Library incorrectly handled loading images from X bitmap format files. An attacker could possibly use this issue to cause GD Graphics Library to crash, resulting in a denial of service, or to disclose contents of the stack that has been left there by previous code. (CVE-2019-11038)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 ESM: libgd-tools 2.1.0-3ubuntu0.11+esm1 libgd3 2.1.0-3ubuntu0.11+esm1
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4316-2 https://usn.ubuntu.com/4316-1 CVE-2018-14553, CVE-2019-11038
--------------505BBBD36D8265AF4F586017 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable
<html> <head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF= -8"> </head> <body> <p><span class=3D"im" style=3D"font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; font-family: Arial, Helvetica, sans-serif; font-size: small; background-color: rgb(255, 255, 255);">=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br> Ubuntu Security Notice USN-4316-2<br> April 02, 2020<br> <br> libgd2 vulnerabilities<br> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D = =3D=3D=3D=3D=3D=3D<br> <br> A security issue affects these releases of Ubuntu and its derivatives:<br> <br> - Ubuntu 14.04 ESM<br> <br> Summary:<br> <br> Several security issues were fixed in GD Graphics Library.<br> <br> Software Description:<br> - libgd2: Open source code library for the dynamic creation of images<br> <br> Details:<br> <br> USN-4316-1 fixed a vulnerability in GD Graphics Library. This update provides<br> the corresponding update for Ubuntu 14.04 ESM.<br> <br> Original advisory details:<br> <br> It was discovered that GD Graphics Library incorrectly handled cloning an<br> image. An attacker could possibly use this issue to cause GD Graphics Library<br> to crash, resulting in a denial of service. (CVE-2018-14553)<br> <br> It was discovered that GD Graphics Library incorrectly handled loading images<br> from X bitmap format files. An attacker could possibly use this issue to cause<br> GD Graphics Library to crash, resulting in a denial of service, or to disclose<br> </span><span style=3D"font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; font-family: Arial, Helvetica, sans-serif; font-size: small; background-color: rgb(255, 255, 255);">contents of the stack that has been left there by previous code. (CVE-2019-11038)</span><br> </p> <div class=3D"HOEnZb adL" style=3D"font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; background-color: rgb(255, 255, 255);"> <div class=3D"im" style=3D"color: rgb(80, 0, 80);"> <p><font color=3D"#000000">Update instructions:</font></p> <font color=3D"#000000">The problem can be corrected by updating your system to the following<br> package versions:<br> <br> Ubuntu 14.04 ESM:<br> =C2=A0 libgd-tools=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A02.1.0-3ubuntu0.11+esm1<br> =C2=A0 libgd3=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 2.1.0-3ubuntu0.11+esm1<br> <br> In general, a standard system update will make all the necessary changes.<br> <br> References:</font><br> =C2=A0=C2=A0<a href=3D"https://usn.ubuntu.com/4316-2" rel=3D"nore= ferrer" target=3D"_blank" data-saferedirecturl=3D"https://www.google.com/url?q=3Dhttps://usn.ubuntu= =2Ecom/4316-2&source=3Dgmail&ust=3D1585953507706000&usg=3DAFQ = jCNHDzSQUN-OSlWvV-qIQ67Xc6W4Q0A" style=3D"color: rgb(17, 85, 204);">https://usn.ubuntu.com/4316-= 2</a><br> =C2=A0=C2=A0<a href=3D"https://usn.ubuntu.com/4316-1" rel=3D"nore= ferrer" target=3D"_blank" data-saferedirecturl=3D"https://www.google.com/url?q=3Dhttps://usn.ubuntu= =2Ecom/4316-1&source=3Dgmail&ust=3D1585953507706000&usg=3DAFQ = jCNHxPWJg3eGQwLhBWgU_85mavMoYrQ" style=3D"color: rgb(17, 85, 204);">https://usn.ubuntu.com/4316-= 1</a><br> <font color=3D"#000000">=C2=A0 CVE-2018-14553, CVE-2019-11038</fo= nt></div> </div> </body> </html>
--------------505BBBD36D8265AF4F586017--
--RQGdeSYQIIQ711Ap412EI2gnLhGb1K1T5--
--0fGScfev8qDTJNOtvaLPRnaIY2RlqeO2R Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEElnO/d49FoUPK9fwytGdj0GOh2+wFAl6GbBAACgkQtGdj0GOh 2+xjqwf9FDb99jwXoJJve7gvv1tPpu9ju5/BshJRjcTAqta9R8MRNnaK0ihDCcPg pVvGct8aUmhG6SSIw4HGq/cI24tfdbUH4j1HtgycUHCQlAgHMPml6DaCWVRuO+DS zeA9hv5gjjbJ10nOB24+DDrxxKdL9FUzHbcTcmGSsEBax2S2N6i9eFKBgCUq/3D7 BO81F3aAlZwSSgGDN33/OO1kEqot6ymEjvBuEf3qSbkCp6gdlfAOB5ywm3gxufq3 lePBPQwoSyoICj9X2qunKZDiNU2KxaC7XYpvgk99vB8gbfZaTP4cxiCc5/w9x+ce PLZrt2MgOTNtayTYP19tgZLqqnNjBg== =UQUF -----END PGP SIGNATURE-----
--0fGScfev8qDTJNOtvaLPRnaIY2RlqeO2R--
--===============1430454729687427858== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============1430454729687427858==--
|