Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Gtk+
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Gtk+
ID: USN-2722-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.04
Datum: Mi, 26. August 2015, 19:57
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
Applikationen: Gtk+

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============1818737478435704370==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="sCP5O2jRg8FUs1siQgdqlGoN9Oko4csMP"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--sCP5O2jRg8FUs1siQgdqlGoN9Oko4csMP
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2722-1
August 26, 2015

gdk-pixbuf vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

GDK-PixBuf could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- gdk-pixbuf: GDK Pixbuf library

Details:

Gustavo Grieco discovered that GDK-PixBuf incorrectly handled scaling
bitmap images. If a user or automated system were tricked into opening a
BMP image file, a remote attacker could use this flaw to cause GDK-PixBuf
to crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
libgdk-pixbuf2.0-0 2.31.3-1ubuntu0.1

Ubuntu 14.04 LTS:
libgdk-pixbuf2.0-0 2.30.7-0ubuntu1.1

Ubuntu 12.04 LTS:
libgdk-pixbuf2.0-0 2.26.1-1ubuntu1.2

After a standard system update you need to restart your session to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2722-1
CVE-2015-4491

Package Information:
https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.31.3-1ubuntu0.1
https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.30.7-0ubuntu1.1
https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.26.1-1ubuntu1.2



--sCP5O2jRg8FUs1siQgdqlGoN9Oko4csMP
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=sm3a
-----END PGP SIGNATURE-----

--sCP5O2jRg8FUs1siQgdqlGoN9Oko4csMP--


--===============1818737478435704370==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============1818737478435704370==--
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung