Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in GIMP
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in GIMP
ID: USN-3025-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10
Datum: Di, 5. Juli 2016, 22:30
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3404732069567145960==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="DqjwJaB0MHQi2buoCken8e2n0GeGiC29B"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--DqjwJaB0MHQi2buoCken8e2n0GeGiC29B
Content-Type: multipart/mixed;
boundary="nOXWOXTtckkBhckF0Gv120Iuw8TnQUAGp"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <577BFCE4.9090406@canonical.com>
Subject: [USN-3025-1] GIMP vulnerability

--nOXWOXTtckkBhckF0Gv120Iuw8TnQUAGp
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3025-1
July 05, 2016

gimp vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

GIMP could be made to crash or run programs as your login if it opened a
specially crafted file.

Software Description:
- gimp: The GNU Image Manipulation Program

Details:

It was discovered that GIMP incorrectly handled malformed XCF files. If a
user were tricked into opening a specially crafted XCF file, an attacker
could cause GIMP to crash, or possibly execute arbitrary code with the
user's privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
gimp 2.8.14-1ubuntu2.1

Ubuntu 14.04 LTS:
gimp 2.8.10-0ubuntu1.1

Ubuntu 12.04 LTS:
gimp 2.6.12-1ubuntu1.4

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3025-1
CVE-2016-4994

Package Information:
https://launchpad.net/ubuntu/+source/gimp/2.8.14-1ubuntu2.1
https://launchpad.net/ubuntu/+source/gimp/2.8.10-0ubuntu1.1
https://launchpad.net/ubuntu/+source/gimp/2.6.12-1ubuntu1.4



--nOXWOXTtckkBhckF0Gv120Iuw8TnQUAGp--

--DqjwJaB0MHQi2buoCken8e2n0GeGiC29B
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=+ZQ5
-----END PGP SIGNATURE-----

--DqjwJaB0MHQi2buoCken8e2n0GeGiC29B--


--===============3404732069567145960==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============3404732069567145960==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung