Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in evince
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in evince
ID: USN-3351-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10, Ubuntu 17.04
Datum: Fr, 14. Juli 2017, 00:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000083
Applikationen: evince

Originalnachricht


--===============1706604246657792899==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="Bd2KlmcTHfsQFEJ+"
Content-Disposition: inline


--Bd2KlmcTHfsQFEJ+
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3351-1
July 13, 2017

evince vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Evince could be made run programs as your login if it opened a
specially crafted file.

Software Description:
- evince: Document viewer

Details:

Felix Wilhelm discovered that Evince did not safely invoke tar when
handling tar comic book (cbt) files. An attacker could use this to
construct a malicious cbt comic book format file that, when opened
in Evince, executes arbitrary code. Please note that this update
disables support for cbt files in Evince.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
evince 3.24.0-0ubuntu1.1
evince-common 3.24.0-0ubuntu1.1

Ubuntu 16.10:
evince 3.22.0-0ubuntu1.1
evince-common 3.22.0-0ubuntu1.1

Ubuntu 16.04 LTS:
evince 3.18.2-1ubuntu4.1
evince-common 3.18.2-1ubuntu4.1

Ubuntu 14.04 LTS:
evince 3.10.3-0ubuntu10.3
evince-common 3.10.3-0ubuntu10.3

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3351-1
CVE-2017-1000083

Package Information:
https://launchpad.net/ubuntu/+source/evince/3.24.0-0ubuntu1.1
https://launchpad.net/ubuntu/+source/evince/3.22.0-0ubuntu1.1
https://launchpad.net/ubuntu/+source/evince/3.18.2-1ubuntu4.1
https://launchpad.net/ubuntu/+source/evince/3.10.3-0ubuntu10.3


--Bd2KlmcTHfsQFEJ+
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJZZ60fAAoJEC8Jno0AXoH0VwkP/jZ56vc2m6dSZEF3ZIjJtT3G
++xEOJ3+THK6+OSAmMswJtzmewBTsYYvnqv0fmXFJGwgUcmfrUV8QeePpj0s/eJk
BOSPgv082DFxtgwP6uSj3oR5bNOn34op3TPwiZONloe6PgNEbxskB3P2sCZEME+5
XtQIMMVEl9Wkob9KMEofKQDAovcsKEr1d9yiJdKuc1Ob1s4qid+kEsErVe/8koiH
/Sxzwgja3PrLjeeqU0Z6n5uXKxH72REaPl6jHeIDWmhbIoUEXwggCnobA6ItEJ+K
QTSV8LX5377sd5JN8kRygCUUhhxGStWtBhTn6GaAqUV8eAZsIrgWWRAR0qTNeb0o
ULV+hDv5M5Ro0pK91aeXbtAM1uVwmbFNfmtZZl4qzsB99yrdouoFtKbCNhyRrAjb
q5n4q05oboJPj9KDGW37un0uSFr6xutyzYk+5kEWJbEcReGwk0wkq7GGJnaysknq
DVZRu99aHntXPZRteabUEiLh1A1TLO17WLw3P0Dm6zUfxLBMN8xXjVQPq1qdoXu9
KXh1qzm9/gjwoqITT4Pbk9hF1rZltTckxPYvuIr4ySFmBkNorJ9DJFdk0jLIuBIR
qDNk/qdvJ/twyLMFXNRsIQb29YARbPLlb8QyQXUJqwT9+RoS/6XbqQBOr50VEWzA
IMq/qzV52uZMptZL+gMA
=nriD
-----END PGP SIGNATURE-----

--Bd2KlmcTHfsQFEJ+--


--===============1706604246657792899==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============1706604246657792899==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung