USN-298-1: libgd2 vulnerability
14 June 2006
libgd2 vulnerability
Releases
Details
Xavier Roche discovered that libgd’s function for reading GIF image
data did not sufficiently verify its validity. Specially crafted GIF
images could cause an infinite loop which used up all available CPU
resources. Since libgd is often used in PHP and Perl web applications,
this could lead to a remote Denial of Service vulnerability.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 6.06
-
libgd2-xpm
-
2.0.33-2ubuntu5.1
-
libgd2-noxpm
-
2.0.33-2ubuntu5.1
Ubuntu 5.10
-
libgd2-xpm
-
2.0.33-1.1ubuntu1.5.10
-
libgd2-noxpm
-
2.0.33-1.1ubuntu1.5.10
Ubuntu 5.04
-
libgd2-xpm
-
2.0.33-1.1ubuntu1.5.04
-
libgd2-noxpm
-
2.0.33-1.1ubuntu1.5.04
After a standard system upgrade you need to reboot your computer to
effect the necessary changes.