Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Ghostscript (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Ghostscript (Aktualisierung)
ID: USN-2434-2
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS
Datum: Mo, 8. Dezember 2014, 16:39
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029
Applikationen: AFPL Ghostscript
Update von: Ausführen beliebiger Kommandos in JasPer

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4240030353266879464==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="DRC4doCTHvKCbRuno4JvBdNHw3GVIXX2S"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--DRC4doCTHvKCbRuno4JvBdNHw3GVIXX2S
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2434-2
December 08, 2014

ghostscript vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 10.04 LTS

Summary:

Ghostscript could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- ghostscript: PostScript and PDF interpreter

Details:

USN-2434-1 fixed a vulnerability in JasPer. This update provides the
corresponding fix for the JasPer library embedded in the Ghostscript
package.

Original advisory details:

Jose Duart discovered that JasPer incorrectly handled certain malformed
JPEG-2000 image files. If a user were tricked into opening a specially
crafted JPEG-2000 image file, a remote attacker could cause JasPer to crash
or possibly execute arbitrary code with user privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
libgs8 8.71.dfsg.1-0ubuntu5.6

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2434-2
http://www.ubuntu.com/usn/usn-2434-1
CVE-2014-9029

Package Information:
https://launchpad.net/ubuntu/+source/ghostscript/8.71.dfsg.1-0ubuntu5.6



--DRC4doCTHvKCbRuno4JvBdNHw3GVIXX2S
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=+F8W
-----END PGP SIGNATURE-----

--DRC4doCTHvKCbRuno4JvBdNHw3GVIXX2S--


--===============4240030353266879464==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4240030353266879464==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung