drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in JasPer
Name: |
Zwei Probleme in JasPer |
|
ID: |
USN-2919-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10 |
|
Datum: |
Do, 3. März 2016, 16:50 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577 |
|
Applikationen: |
JasPer |
|
Originalnachricht |
--===============5371394731377881257== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="Kj7319i9nmIyA2yE" Content-Disposition: inline
--Kj7319i9nmIyA2yE Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-2919-1 March 03, 2016
jasper vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in JasPer.
Software Description: - jasper: Library for manipulating JPEG-2000 files
Details:
Jacob Baines discovered that JasPer incorrectly handled ICC color profiles in JPEG-2000 image files. If a user were tricked into opening a specially crafted JPEG-2000 image file, a remote attacker could cause JasPer to crash or possibly execute arbitrary code with user privileges. (CVE-2016-1577)
Tyler Hicks discovered that JasPer incorrectly handled memory when processing JPEG-2000 image files. If a user were tricked into opening a specially crafted JPEG-2000 image file, a remote attacker could cause JasPer to consume memory, resulting in a denial of service. (CVE-2016-2116)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: libjasper1 1.900.1-debian1-2.4ubuntu0.15.10.1
Ubuntu 14.04 LTS: libjasper1 1.900.1-14ubuntu3.3
Ubuntu 12.04 LTS: libjasper1 1.900.1-13ubuntu0.3
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2919-1 CVE-2016-1577, CVE-2016-2116
Package Information: https://launchpad.net/ubuntu/+source/jasper/1.900.1-debian1-2.4ubuntu0.15.10.1 https://launchpad.net/ubuntu/+source/jasper/1.900.1-14ubuntu3.3 https://launchpad.net/ubuntu/+source/jasper/1.900.1-13ubuntu0.3
--Kj7319i9nmIyA2yE Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJW2FWkAAoJENaSAD2qAscK19EP/0t59DuMfOg5FYsbYHgDBnFJ xicDnuHqfhsAUvBQKwE5X45KJhIbJ6IkkZL0LdiU3YNoD8ZxarH6oE6kCw+BqbpF MFgEwWAOnyv85mU2bkm0tLdsBbKCsSKpx7zwGqtR5Q4hF98judXKqX82dmmV2s/S 6ZivqkWpcqbGfTzevwRdEsMUvY8cGoOcO2Q0eWoy4K8lzq/nHf+fUZLGKVG2po0+ 1M3HPJZOUeVwR8Np9KajkRIChjlrQlxV90VxzdZMCuk+6C6KrBlzoQJi/+E3Aell nCKRbFvFwcDH3LeEtqlSEGVqkKu0dILDf68K3pv8GY5OI8rt6SX+8wCwLnnhtC/2 2Od0mIAGMAd7sRTh/rEFd1dBej/MEXTWGJQsULgKqmTeSG9FcphIopqj4ZNFhgMi rZtpCPiIaqh/p+Thkb/S2dEFFNRcOaEWpaz3AOQCKLcc5JBrkdSV8gH3cngX6c+F Ko6RaPfmJ/serfVpjO0WxaQmmbBxdZU/dP00gqlR9LPW7dxyAD6krzyjerdNT9ZC AFU6n2rDu0NwmHUhRdIcOJJo6fZFMhHwTdxSJHbBwRL9sFNsHYhoJk2Y6yXhfWvE kNj34OrO+GB1RZ/5XmNJSoLJuwc8HEgePgG6HYDqZNtqFi7O3kuDyU8rbN3atLIz rRo8dTA2F7CJ90m4Bd7I =IUE2 -----END PGP SIGNATURE-----
--Kj7319i9nmIyA2yE--
--===============5371394731377881257== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============5371394731377881257==--
|
|
|
|