Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Zwei Probleme in JasPer
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in JasPer
ID: DSA-3138-1
Distribution: Debian
Plattformen: Debian wheezy
Datum: So, 25. Januar 2015, 12:14
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3138-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
January 25, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : jasper
CVE ID : CVE-2014-8157 CVE-2014-8158
Debian Bug : 775970

An off-by-one flaw, leading to a heap-based buffer overflow
(CVE-2014-8157), and an unrestricted stack memory use flaw
(CVE-2014-8158) were found in JasPer, a library for manipulating
JPEG-2000 files. A specially crafted file could cause an application
using JasPer to crash or, possibly, execute arbitrary code.

For the stable distribution (wheezy), these problems have been fixed in
version 1.900.1-13+deb7u3.

For the upcoming stable distribution (jessie) and the unstable
distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your jasper packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=o2x6
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Archive: https://lists.debian.org/E1YFJzw-00067c-BN@master.debian.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung