USN-298-1: libgd2 vulnerability

Publication date

14 June 2006

Overview

libgd2 vulnerability


Details

Xavier Roche discovered that libgd’s function for reading GIF image
data did not sufficiently verify its validity. Specially crafted GIF
images could cause an infinite loop which used up all available CPU
resources. Since libgd is often used in PHP and Perl web applications,
this could lead to a remote Denial of Service vulnerability.

Xavier Roche discovered that libgd’s function for reading GIF image
data did not sufficiently verify its validity. Specially crafted GIF
images could cause an infinite loop which used up all available CPU
resources. Since libgd is often used in PHP and Perl web applications,
this could lead to a remote Denial of Service vulnerability.

Update instructions

After a standard system upgrade you need to reboot your computer to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
6.06 dapper libgd2-xpm –  2.0.33-2ubuntu5.1
libgd2-noxpm –  2.0.33-2ubuntu5.1
5.10 breezy libgd2-xpm –  2.0.33-1.1ubuntu1.5.10
libgd2-noxpm –  2.0.33-1.1ubuntu1.5.10
5.04 hoary libgd2-xpm –  2.0.33-1.1ubuntu1.5.04
libgd2-noxpm –  2.0.33-1.1ubuntu1.5.04

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›