Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Gtk+
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Gtk+
ID: USN-3418-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 17.04
Datum: Mo, 18. September 2017, 21:56
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862

Originalnachricht


--===============6915123094952831323==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-jlQl1vy76+NCsCCarmRE"


--=-jlQl1vy76+NCsCCarmRE
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3418-1
September 18, 2017

gdk-pixbuf vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

GDK-PixBuf could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- gdk-pixbuf: GDK Pixbuf library

Details:

It was discovered that the GDK-PixBuf library did not properly handle
certain jpeg images. If an user or automated system were tricked into
opening a specially crafted jpeg file, a remote attacker could use this
flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2017-2862)

It was discovered that the GDK-PixBuf library did not properly handle
certain tiff images. If an user or automated system were tricked into
opening a specially crafted tiff file, a remote attacker could use this
flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2017-2870)

Ariel Zelivansky discovered that the GDK-PixBuf library did not
properly handle printing certain error messages. If an user or
automated system were tricked into opening a specially crafted image
file, a remote attacker could use this flaw to cause GDK-PixBuf to
crash, resulting in a denial of service. (CVE-2017-6311)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
  libgdk-pixbuf2.0-0              2.36.5-3ubuntu0.2

Ubuntu 16.04 LTS:
  libgdk-pixbuf2.0-0              2.32.2-1ubuntu1.3

Ubuntu 14.04 LTS:
  libgdk-pixbuf2.0-0              2.30.7-0ubuntu1.7

After a standard system update you need to restart your session to make
all the necessary changes.

References:
  https://www.ubuntu.com/usn/usn-3418-1
  CVE-2017-2862, CVE-2017-2870, CVE-2017-6311

Package Information:
  https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.36.5-3ubuntu0.2
  https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.32.2-1ubuntu1.3
  https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.30.7-0ubuntu1.7

--ÓlQl1vy76+NCsCCarmRE
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=KmC4
-----END PGP SIGNATURE-----

--=-jlQl1vy76+NCsCCarmRE--



--===============6915123094952831323==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============6915123094952831323==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung