drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in evince
Name: |
Ausführen beliebiger Kommandos in evince |
|
ID: |
USN-3351-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10, Ubuntu 17.04 |
|
Datum: |
Fr, 14. Juli 2017, 00:20 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000083 |
|
Applikationen: |
evince |
|
Originalnachricht |
--===============1706604246657792899== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="Bd2KlmcTHfsQFEJ+" Content-Disposition: inline
--Bd2KlmcTHfsQFEJ+ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-3351-1 July 13, 2017
evince vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04 - Ubuntu 16.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
Evince could be made run programs as your login if it opened a specially crafted file.
Software Description: - evince: Document viewer
Details:
Felix Wilhelm discovered that Evince did not safely invoke tar when handling tar comic book (cbt) files. An attacker could use this to construct a malicious cbt comic book format file that, when opened in Evince, executes arbitrary code. Please note that this update disables support for cbt files in Evince.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.04: evince 3.24.0-0ubuntu1.1 evince-common 3.24.0-0ubuntu1.1
Ubuntu 16.10: evince 3.22.0-0ubuntu1.1 evince-common 3.22.0-0ubuntu1.1
Ubuntu 16.04 LTS: evince 3.18.2-1ubuntu4.1 evince-common 3.18.2-1ubuntu4.1
Ubuntu 14.04 LTS: evince 3.10.3-0ubuntu10.3 evince-common 3.10.3-0ubuntu10.3
In general, a standard system update will make all the necessary changes.
References: https://www.ubuntu.com/usn/usn-3351-1 CVE-2017-1000083
Package Information: https://launchpad.net/ubuntu/+source/evince/3.24.0-0ubuntu1.1 https://launchpad.net/ubuntu/+source/evince/3.22.0-0ubuntu1.1 https://launchpad.net/ubuntu/+source/evince/3.18.2-1ubuntu4.1 https://launchpad.net/ubuntu/+source/evince/3.10.3-0ubuntu10.3
--Bd2KlmcTHfsQFEJ+ Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJZZ60fAAoJEC8Jno0AXoH0VwkP/jZ56vc2m6dSZEF3ZIjJtT3G ++xEOJ3+THK6+OSAmMswJtzmewBTsYYvnqv0fmXFJGwgUcmfrUV8QeePpj0s/eJk BOSPgv082DFxtgwP6uSj3oR5bNOn34op3TPwiZONloe6PgNEbxskB3P2sCZEME+5 XtQIMMVEl9Wkob9KMEofKQDAovcsKEr1d9yiJdKuc1Ob1s4qid+kEsErVe/8koiH /Sxzwgja3PrLjeeqU0Z6n5uXKxH72REaPl6jHeIDWmhbIoUEXwggCnobA6ItEJ+K QTSV8LX5377sd5JN8kRygCUUhhxGStWtBhTn6GaAqUV8eAZsIrgWWRAR0qTNeb0o ULV+hDv5M5Ro0pK91aeXbtAM1uVwmbFNfmtZZl4qzsB99yrdouoFtKbCNhyRrAjb q5n4q05oboJPj9KDGW37un0uSFr6xutyzYk+5kEWJbEcReGwk0wkq7GGJnaysknq DVZRu99aHntXPZRteabUEiLh1A1TLO17WLw3P0Dm6zUfxLBMN8xXjVQPq1qdoXu9 KXh1qzm9/gjwoqITT4Pbk9hF1rZltTckxPYvuIr4ySFmBkNorJ9DJFdk0jLIuBIR qDNk/qdvJ/twyLMFXNRsIQb29YARbPLlb8QyQXUJqwT9+RoS/6XbqQBOr50VEWzA IMq/qzV52uZMptZL+gMA =nriD -----END PGP SIGNATURE-----
--Bd2KlmcTHfsQFEJ+--
--===============1706604246657792899== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============1706604246657792899==--
|
|
|
|