---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for libgd2 SECUNIA ADVISORY ID: SA21186 VERIFY ADVISORY: http://secunia.com/advisories/21186/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for libgd2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) against applications and services using libgd2. For more information: SA20500 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33-1.1sarge1.dsc Size/MD5 checksum: 885 e389163781898504ec6e8e0018cd1fdd http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33-1.1sarge1.diff.gz Size/MD5 checksum: 260955 50e0aa54bda19f06041d78a5771c7fd1 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz Size/MD5 checksum: 587617 be0a6d326cd8567e736fbc75df0a5c45 Architecture independent components: http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.33-1.1sarge1_all.deb Size/MD5 checksum: 128526 bcaaacf60733a35002b999f8851ce3a7 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33-1.1sarge1_all.deb Size/MD5 checksum: 128500 4ef28350291c173754332cc61cb54ba1 Alpha architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_alpha.deb Size/MD5 checksum: 144914 65aa478f07315cb7e62ac6d91177b96d http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_alpha.deb Size/MD5 checksum: 206668 8cded1b036579ebc7c62f1ac37824ac6 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_alpha.deb Size/MD5 checksum: 357800 cc21def16f0e514da5d34c2f513b3daf http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_alpha.deb Size/MD5 checksum: 208490 fa17839a6953dbd709eda8783be6ead1 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_alpha.deb Size/MD5 checksum: 362160 0be347a2217d06fe7ef36b002ea7c9ca AMD64 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_amd64.deb Size/MD5 checksum: 141774 1f54d14b016a5ad132998ff669226244 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_amd64.deb Size/MD5 checksum: 196436 6ff8e6d85237e34ddd12c9aea85bd314 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_amd64.deb Size/MD5 checksum: 337310 bfd77a6cdc6aaa1c64d6c4be1a8acea8 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_amd64.deb Size/MD5 checksum: 198932 a084415f7c3dfc684569d626dd80aacb http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_amd64.deb Size/MD5 checksum: 340294 8fdc6f33e6253346c4f853db61501a21 ARM architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_arm.deb Size/MD5 checksum: 141374 b157ca4d44fffd20740c162535ca9e3f http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_arm.deb Size/MD5 checksum: 188664 5b3a0e8dcb02e3fa83cb8a618a57c456 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_arm.deb Size/MD5 checksum: 334316 74999431b3008c7f4820d0405a236c0f http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_arm.deb Size/MD5 checksum: 191308 b29466e1a38e863dce0b1cdb535e3cfc http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_arm.deb Size/MD5 checksum: 337536 761e0550e4d9343d2056dba350c1cd1f Intel IA-32 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_i386.deb Size/MD5 checksum: 141786 1cc957c1d1cb93e2d80c85d0c84dcfd1 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_i386.deb Size/MD5 checksum: 191932 f66bc591f047503e80d107458e938416 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_i386.deb Size/MD5 checksum: 328576 27953838b048aab48d4eee40fc630f6f http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_i386.deb Size/MD5 checksum: 193690 580d72764e8b331f9be599b45894497d http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_i386.deb Size/MD5 checksum: 330848 0c980ae4c5a0e93725175e69c7d8176f Intel IA-64 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_ia64.deb Size/MD5 checksum: 146290 a07f3ae8f234ca3e3b5e81eebf3c446d http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_ia64.deb Size/MD5 checksum: 224272 c057fe07156af1945b9eab8909a28bec http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_ia64.deb Size/MD5 checksum: 370376 6f8485a4f4d916d75dc21b20a113ad98 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_ia64.deb Size/MD5 checksum: 227040 4983686be756f0fdd7ab03cf1cc9c195 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_ia64.deb Size/MD5 checksum: 373400 896aaaaec2747772779073c837fe2d84 HP Precision architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_hppa.deb Size/MD5 checksum: 143562 c4223c693e1a24336ddab5a92e3d019b http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_hppa.deb Size/MD5 checksum: 204504 371343c96979ae3b6688a9471333dd20 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_hppa.deb Size/MD5 checksum: 345608 267ea3ea2dedc6b7d1b991821eff0327 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_hppa.deb Size/MD5 checksum: 207026 ad942c88f11286a44e9aac850fb10a3a http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_hppa.deb Size/MD5 checksum: 348272 926ac97ade522d92be98fd0035536c45 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_m68k.deb Size/MD5 checksum: 141456 1477bf288e99fa9bdf1640c828d7f1a5 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_m68k.deb Size/MD5 checksum: 184864 9cde2fe10257ecaf581300e024dd7f0c http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_m68k.deb Size/MD5 checksum: 323520 634a13523c02c7b831228c128fe320c8 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_m68k.deb Size/MD5 checksum: 187018 b6fcadf304e52fa9e57ceb168e495156 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_m68k.deb Size/MD5 checksum: 325634 44468789f4014425c7c84c62fdb07914 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_mips.deb Size/MD5 checksum: 155774 5af80762b00f46f1f9fdc46a78941191 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_mips.deb Size/MD5 checksum: 195396 c10d28c9f999639745c04889c0581516 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_mips.deb Size/MD5 checksum: 344960 0b3bc47908a4f25ebb58b27c5e6fa730 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_mips.deb Size/MD5 checksum: 198016 9fe5be1930a8f9ff4ab15b09aff626fb http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_mips.deb Size/MD5 checksum: 347410 da9fb9aeb4c9891cb5dec62ca9263aaa Little endian MIPS architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_mipsel.deb Size/MD5 checksum: 155772 58c478bc430bd49cece6e748218e6200 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_mipsel.deb Size/MD5 checksum: 195330 ca975af25d3362ce4a4c9e19b1d27b50 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_mipsel.deb Size/MD5 checksum: 344992 096e665346647e297e943684e7222e5f http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_mipsel.deb Size/MD5 checksum: 197846 660f0ba2f884e249d5ffd7302f398a01 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_mipsel.deb Size/MD5 checksum: 347270 69c4a6744e74455997a8228566a47f00 PowerPC architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_powerpc.deb Size/MD5 checksum: 150276 46c99b85b1faf609147cc111b747841d http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_powerpc.deb Size/MD5 checksum: 198830 c8168aa92f4008e2943893fa5ccae820 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_powerpc.deb Size/MD5 checksum: 341538 505e633e80f425c8b9422e83997ac07c http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_powerpc.deb Size/MD5 checksum: 200916 16d8a96a3fc3b28a7355680fedaef3e8 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_powerpc.deb Size/MD5 checksum: 344206 47c92a9a5bbc22637f5fee0223034a97 IBM S/390 architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_s390.deb Size/MD5 checksum: 142414 a30ad94d6ca809d519a088771b31fc1d http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_s390.deb Size/MD5 checksum: 199456 c99ca505a026d2b7b01dea1eaeebc4a5 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_s390.deb Size/MD5 checksum: 337702 c45bca23bef2f03a03a6e07e37757281 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_s390.deb Size/MD5 checksum: 202030 34639f38ecfed22b1b1887a918516dce http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_s390.deb Size/MD5 checksum: 341264 c510662e0889b70e73b8e76c568009e6 Sun Sparc architecture: http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_sparc.deb Size/MD5 checksum: 141382 71ccad065f8a4a21ee8337537e732b90 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_sparc.deb Size/MD5 checksum: 191428 aa0a6d650fb2eb6322d2582f7489ed73 http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_sparc.deb Size/MD5 checksum: 332436 26d15a5c68f2a47a5eccf4ba3b4980fb http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_sparc.deb Size/MD5 checksum: 194072 95aa9e357d5dd4f0105e1f7888b9bb4f http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_sparc.deb Size/MD5 checksum: 334118 a6d05fae692cd60c72b231a78230a38a -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.0.33-5. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1117 OTHER REFERENCES: SA20500: http://secunia.com/advisories/20500/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------