<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body>
<p><span class="im" style="font-style: normal;
font-variant-ligatures: normal; font-variant-caps: normal;
font-weight: 400; letter-spacing: normal; text-align: start;
text-indent: 0px; text-transform: none; white-space: normal;
word-spacing: 0px; -webkit-text-stroke-width: 0px;
text-decoration-style: initial; text-decoration-color: initial;
font-family: Arial, Helvetica, sans-serif; font-size: small;
background-color: rgb(255, 255, 255);">==============================<wbr>==============================<wbr>==============<br>
Ubuntu Security Notice USN-4316-2<br>
April 02, 2020<br>
<br>
libgd2 vulnerabilities<br>
==============================<wbr>==============================<wbr>==============<br>
<br>
A security issue affects these releases of Ubuntu and its
derivatives:<br>
<br>
- Ubuntu 14.04 ESM<br>
<br>
Summary:<br>
<br>
Several security issues were fixed in GD Graphics Library.<br>
<br>
Software Description:<br>
- libgd2: Open source code library for the dynamic creation of
images<br>
<br>
Details:<br>
<br>
USN-4316-1 fixed a vulnerability in GD Graphics Library. This
update provides<br>
the corresponding update for Ubuntu 14.04 ESM.<br>
<br>
Original advisory details:<br>
<br>
It was discovered that GD Graphics Library incorrectly handled
cloning an<br>
image. An attacker could possibly use this issue to cause GD
Graphics Library<br>
to crash, resulting in a denial of service. (CVE-2018-14553)<br>
<br>
It was discovered that GD Graphics Library incorrectly handled
loading images<br>
from X bitmap format files. An attacker could possibly use this
issue to cause<br>
GD Graphics Library to crash, resulting in a denial of service,
or to disclose<br>
</span><span style="font-style: normal; font-variant-ligatures:
normal; font-variant-caps: normal; font-weight: 400;
letter-spacing: normal; text-align: start; text-indent: 0px;
text-transform: none; white-space: normal; word-spacing: 0px;
-webkit-text-stroke-width: 0px; text-decoration-style: initial;
text-decoration-color: initial; font-family: Arial, Helvetica,
sans-serif; font-size: small; background-color: rgb(255, 255,
255);">contents of the stack that has been left there by
previous code. (CVE-2019-11038)</span><br>
</p>
<div class="HOEnZb adL" style="font-style: normal;
font-variant-ligatures: normal; font-variant-caps: normal;
font-weight: 400; letter-spacing: normal; orphans: 2; text-align:
start; text-indent: 0px; text-transform: none; white-space:
normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width:
0px; text-decoration-style: initial; text-decoration-color:
initial; color: rgb(34, 34, 34); font-family: Arial, Helvetica,
sans-serif; font-size: small; background-color: rgb(255, 255,
255);">
<div class="im" style="color: rgb(80, 0, 80);">
<p><font color="#000000">Update instructions:</font></p>
<font color="#000000">The problem can be corrected by updating
your system to the following<br>
package versions:<br>
<br>
Ubuntu 14.04 ESM:<br>
libgd-tools 2.1.0-3ubuntu0.11+esm1<br>
libgd3 2.1.0-3ubuntu0.11+esm1<br>
<br>
In general, a standard system update will make all the
necessary changes.<br>
<br>
References:</font><br>
<a href="https://usn.ubuntu.com/4316-2" rel="noreferrer"
target="_blank"
data-saferedirecturl="https://www.google.com/url?q=https://usn.ubuntu.com/4316-2&source=gmail&ust=1585953507706000&usg=AFQjCNHDzSQUN-OSlWvV-qIQ67Xc6W4Q0A"
style="color: rgb(17, 85, 204);">https://usn.ubuntu.com/4316-2</a><br>
<a href="https://usn.ubuntu.com/4316-1" rel="noreferrer"
target="_blank"
data-saferedirecturl="https://www.google.com/url?q=https://usn.ubuntu.com/4316-1&source=gmail&ust=1585953507706000&usg=AFQjCNHxPWJg3eGQwLhBWgU_85mavMoYrQ"
style="color: rgb(17, 85, 204);">https://usn.ubuntu.com/4316-1</a><br>
<font color="#000000"> CVE-2018-14553, CVE-2019-11038</font></div>
</div>
</body>
</html>