Login
Newsletter
Werbung

Sicherheit: Mangelnde Rechteprüfung in Batik
Aktuelle Meldungen Distributionen
Name: Mangelnde Rechteprüfung in Batik
ID: USN-3280-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS
Datum: Di, 9. Mai 2017, 23:10
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5662
Applikationen: Batik

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4723023167596510420==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="gmoL9j1X2Q2EnqAsgKElFP75tBUou3jWn"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--gmoL9j1X2Q2EnqAsgKElFP75tBUou3jWn
Content-Type: multipart/mixed;
boundary="RAlP7vCvvD2wH5QgbR2u4M0uo5QF2N4x7"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <aafb7be6-401d-d613-2927-b4ba9cc131fa@canonical.com>
Subject: [USN-3280-1] Apache Batik vulnerability

--RAlP7vCvvD2wH5QgbR2u4M0uo5QF2N4x7
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3280-1
May 09, 2017

batik vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

Apache Batik would allow unintended access to files over the network or
could be made to crash.

Software Description:
- batik: SVG Library

Details:

Lars Krapf and Pierre Ernst discovered that Apache Batik incorrectly
handled XML external entities. A remote attacker could possibly use this
issue to obtain sensitive files from the filesystem, or cause a denial of
service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
libbatik-java 1.7.ubuntu-8ubuntu2.14.04.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3280-1
CVE-2017-5662

Package Information:
https://launchpad.net/ubuntu/+source/batik/1.7.ubuntu-8ubuntu2.14.04.2



--RAlP7vCvvD2wH5QgbR2u4M0uo5QF2N4x7--

--gmoL9j1X2Q2EnqAsgKElFP75tBUou3jWn
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=5VlL
-----END PGP SIGNATURE-----

--gmoL9j1X2Q2EnqAsgKElFP75tBUou3jWn--


--===============4723023167596510420==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4723023167596510420==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung