RedHat: Moderate: gd security update
Summary
Summary
The gd package contains a graphics library used for the dynamic creation of images such as PNG and JPEG. Several buffer overflow flaws were found in the way gd allocates memory. An attacker could create a carefully crafted image that could execute arbitrary code if opened by a victim using a program linked against the gd library. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2004-0941 to these issues. Users of gd should upgrade to these updated packages, which contain a backported patch and is not vulnerable to these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
175413 - CVE-2004-0941 additional overflows in gd
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
0e1bd5cb5215e65a7120b82132ac6b9e gd-2.0.28-4.4E.1.src.rpm
i386:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
999a383add1284e00cc25185fae78008 gd-devel-2.0.28-4.4E.1.i386.rpm
df53c01e62afb6e14d5b8299b68836b0 gd-progs-2.0.28-4.4E.1.i386.rpm
ia64:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
e27753d66dc328e1fca00c9817bac747 gd-2.0.28-4.4E.1.ia64.rpm
cf9a90ececb359b4e178a08e58fbec12 gd-devel-2.0.28-4.4E.1.ia64.rpm
9784499cf742864a0c185ac5653d03ab gd-progs-2.0.28-4.4E.1.ia64.rpm
ppc:
f2aaf2eeb438dc9cdbd2e17d84ab5503 gd-2.0.28-4.4E.1.ppc.rpm
f9d4a0395e2c95f45eaab554ff81412f gd-2.0.28-4.4E.1.ppc64.rpm
38d97c9832e49fcce8e518647f979212 gd-devel-2.0.28-4.4E.1.ppc.rpm
239b6c7acd59d9b3e01dc4ea2e1bf6d7 gd-progs-2.0.28-4.4E.1.ppc.rpm
s390:
54c5d0d9c01fea69d85d70d9cd7a5662 gd-2.0.28-4.4E.1.s390.rpm
54c3a6d08d050e7607518b76a72737d1 gd-devel-2.0.28-4.4E.1.s390.rpm
ba8a6612e144109d0961f1fe4d301388 gd-progs-2.0.28-4.4E.1.s390.rpm
s390x:
54c5d0d9c01fea69d85d70d9cd7a5662 gd-2.0.28-4.4E.1.s390.rpm
1468dfa689881d58ac8bfe6e0166b359 gd-2.0.28-4.4E.1.s390x.rpm
474c64458e40bea0166796eb711d5045 gd-devel-2.0.28-4.4E.1.s390x.rpm
ee74f993e7381a5f90aaacaff217c262 gd-progs-2.0.28-4.4E.1.s390x.rpm
x86_64:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
9f8f96be348ac13b987a872a80ecae58 gd-2.0.28-4.4E.1.x86_64.rpm
3435f155aec324ef3cecca6f4d588e28 gd-devel-2.0.28-4.4E.1.x86_64.rpm
e961c9c4bbe083244017ee6559fcf743 gd-progs-2.0.28-4.4E.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
0e1bd5cb5215e65a7120b82132ac6b9e gd-2.0.28-4.4E.1.src.rpm
i386:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
999a383add1284e00cc25185fae78008 gd-devel-2.0.28-4.4E.1.i386.rpm
df53c01e62afb6e14d5b8299b68836b0 gd-progs-2.0.28-4.4E.1.i386.rpm
x86_64:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
9f8f96be348ac13b987a872a80ecae58 gd-2.0.28-4.4E.1.x86_64.rpm
3435f155aec324ef3cecca6f4d588e28 gd-devel-2.0.28-4.4E.1.x86_64.rpm
e961c9c4bbe083244017ee6559fcf743 gd-progs-2.0.28-4.4E.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
0e1bd5cb5215e65a7120b82132ac6b9e gd-2.0.28-4.4E.1.src.rpm
i386:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
999a383add1284e00cc25185fae78008 gd-devel-2.0.28-4.4E.1.i386.rpm
df53c01e62afb6e14d5b8299b68836b0 gd-progs-2.0.28-4.4E.1.i386.rpm
ia64:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
e27753d66dc328e1fca00c9817bac747 gd-2.0.28-4.4E.1.ia64.rpm
cf9a90ececb359b4e178a08e58fbec12 gd-devel-2.0.28-4.4E.1.ia64.rpm
9784499cf742864a0c185ac5653d03ab gd-progs-2.0.28-4.4E.1.ia64.rpm
x86_64:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
9f8f96be348ac13b987a872a80ecae58 gd-2.0.28-4.4E.1.x86_64.rpm
3435f155aec324ef3cecca6f4d588e28 gd-devel-2.0.28-4.4E.1.x86_64.rpm
e961c9c4bbe083244017ee6559fcf743 gd-progs-2.0.28-4.4E.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
0e1bd5cb5215e65a7120b82132ac6b9e gd-2.0.28-4.4E.1.src.rpm
i386:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
999a383add1284e00cc25185fae78008 gd-devel-2.0.28-4.4E.1.i386.rpm
df53c01e62afb6e14d5b8299b68836b0 gd-progs-2.0.28-4.4E.1.i386.rpm
ia64:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
e27753d66dc328e1fca00c9817bac747 gd-2.0.28-4.4E.1.ia64.rpm
cf9a90ececb359b4e178a08e58fbec12 gd-devel-2.0.28-4.4E.1.ia64.rpm
9784499cf742864a0c185ac5653d03ab gd-progs-2.0.28-4.4E.1.ia64.rpm
x86_64:
884d6670cd82e39db34c684616dea78c gd-2.0.28-4.4E.1.i386.rpm
9f8f96be348ac13b987a872a80ecae58 gd-2.0.28-4.4E.1.x86_64.rpm
3435f155aec324ef3cecca6f4d588e28 gd-devel-2.0.28-4.4E.1.x86_64.rpm
e961c9c4bbe083244017ee6559fcf743 gd-progs-2.0.28-4.4E.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941
Package List
Topic
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Bugs Fixed