Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in Eye of Gnome
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in Eye of Gnome
ID: USN-3069-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 16.04 LTS
Datum: Do, 25. August 2016, 17:01
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6855
Applikationen: Eye of GNOME

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2415071081794664980==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="T5C3uwLMs75psPSjOa7a0kHb8Pwl6CIIu"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--T5C3uwLMs75psPSjOa7a0kHb8Pwl6CIIu
Content-Type: multipart/mixed;
boundary="9rtJusiQb3mNENlQrgEJa5MQKHGXa0pPo"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <d3f887d1-7daf-a06d-4d4c-7ecfb9faaf33@canonical.com>
Subject: [USN-3069-1] Eye of GNOME vulnerability

--9rtJusiQb3mNENlQrgEJa5MQKHGXa0pPo
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3069-1
August 25, 2016

eog vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Eye of GNOME could be made to crash or run programs as your login if it
opened a specially crafted image.

Software Description:
- eog: Eye of GNOME graphics viewer program

Details:

It was discovered that Eye of GNOME incorrectly handled certain invalid
UTF-8 strings. If a user were tricked into opening a specially-crafted
image, a remote attacker could use this issue to cause Eye of GNOME to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
eog 3.18.2-1ubuntu2.1

Ubuntu 14.04 LTS:
eog 3.10.2-0ubuntu5.2

Ubuntu 12.04 LTS:
eog 3.4.2-0ubuntu1.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3069-1
CVE-2016-6855

Package Information:
https://launchpad.net/ubuntu/+source/eog/3.18.2-1ubuntu2.1
https://launchpad.net/ubuntu/+source/eog/3.10.2-0ubuntu5.2
https://launchpad.net/ubuntu/+source/eog/3.4.2-0ubuntu1.3



--9rtJusiQb3mNENlQrgEJa5MQKHGXa0pPo--

--T5C3uwLMs75psPSjOa7a0kHb8Pwl6CIIu
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=Q9p3
-----END PGP SIGNATURE-----

--T5C3uwLMs75psPSjOa7a0kHb8Pwl6CIIu--


--===============2415071081794664980==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============2415071081794664980==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung