Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in JasPer
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in JasPer
ID: USN-2919-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10
Datum: Do, 3. März 2016, 16:50
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577
Applikationen: JasPer

Originalnachricht


--===============5371394731377881257==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="Kj7319i9nmIyA2yE"
Content-Disposition: inline


--Kj7319i9nmIyA2yE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-2919-1
March 03, 2016

jasper vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in JasPer.

Software Description:
- jasper: Library for manipulating JPEG-2000 files

Details:

Jacob Baines discovered that JasPer incorrectly handled ICC color profiles
in JPEG-2000 image files. If a user were tricked into opening a specially
crafted JPEG-2000 image file, a remote attacker could cause JasPer to
crash or possibly execute arbitrary code with user privileges.
(CVE-2016-1577)

Tyler Hicks discovered that JasPer incorrectly handled memory when
processing JPEG-2000 image files. If a user were tricked into opening a
specially crafted JPEG-2000 image file, a remote attacker could cause
JasPer to consume memory, resulting in a denial of service.
(CVE-2016-2116)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
libjasper1 1.900.1-debian1-2.4ubuntu0.15.10.1

Ubuntu 14.04 LTS:
libjasper1 1.900.1-14ubuntu3.3

Ubuntu 12.04 LTS:
libjasper1 1.900.1-13ubuntu0.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2919-1
CVE-2016-1577, CVE-2016-2116

Package Information:
https://launchpad.net/ubuntu/+source/jasper/1.900.1-debian1-2.4ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/jasper/1.900.1-14ubuntu3.3
https://launchpad.net/ubuntu/+source/jasper/1.900.1-13ubuntu0.3


--Kj7319i9nmIyA2yE
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=IUE2
-----END PGP SIGNATURE-----

--Kj7319i9nmIyA2yE--


--===============5371394731377881257==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============5371394731377881257==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung