Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in X11
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in X11
ID: USN-3185-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10
Datum: Mi, 1. Februar 2017, 22:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10164

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4120151725586521074==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="niKANB0muKDK36nPS8uPLVBLS75pswGml"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--niKANB0muKDK36nPS8uPLVBLS75pswGml
Content-Type: multipart/mixed;
boundary="QAok7k9gBXc3RxABNfNpVvWNRhQeNcHr2"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <c25ea215-3052-0457-00a3-1a10c74f358b@canonical.com>
Subject: [USN-3185-1] libXpm vulnerability

--QAok7k9gBXc3RxABNfNpVvWNRhQeNcHr2
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3185-1
February 01, 2017

libxpm vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

libXpm could be made to crash or run programs if it opened a specially
crafted file.

Software Description:
- libxpm: X11 pixmap library

Details:

It was discovered that libXpm incorrectly handled certain XPM files. If a
user or automated system were tricked into opening a specially crafted XPM
file, a remote attacker could use this issue to cause libXpm to crash,
resulting in a denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
libxpm4 1:3.5.11-1ubuntu0.16.10.1

Ubuntu 16.04 LTS:
libxpm4 1:3.5.11-1ubuntu0.16.04.1

Ubuntu 14.04 LTS:
libxpm4 1:3.5.10-1ubuntu0.1

Ubuntu 12.04 LTS:
libxpm4 1:3.5.9-4ubuntu0.1

After a standard system update you need to restart your session to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3185-1
CVE-2016-10164

Package Information:
https://launchpad.net/ubuntu/+source/libxpm/1:3.5.11-1ubuntu0.16.10.1
https://launchpad.net/ubuntu/+source/libxpm/1:3.5.11-1ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/libxpm/1:3.5.10-1ubuntu0.1
https://launchpad.net/ubuntu/+source/libxpm/1:3.5.9-4ubuntu0.1



--QAok7k9gBXc3RxABNfNpVvWNRhQeNcHr2--

--niKANB0muKDK36nPS8uPLVBLS75pswGml
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=vwxA
-----END PGP SIGNATURE-----

--niKANB0muKDK36nPS8uPLVBLS75pswGml--


--===============4120151725586521074==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4120151725586521074==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung