drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in LibRaw
Name: |
Denial of Service in LibRaw |
|
ID: |
USN-6377-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 20.04 LTS |
|
Datum: |
Mo, 18. September 2023, 22:40 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22628 |
|
Applikationen: |
LibRaw |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6922671490681709554== Content-Language: en-CA Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------hx2NbjLqFWEX90x9nhBfa0Um"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------hx2NbjLqFWEX90x9nhBfa0Um Content-Type: multipart/mixed; boundary="------------YaC6AlWVb8Y2UB8mSQAYlbXP"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <c8269d7e-e61c-1ac3-c0ca-a6bedc493870@canonical.com> Subject: [USN-6377-1] LibRaw vulnerability
--------------YaC6AlWVb8Y2UB8mSQAYlbXP Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6377-1 September 18, 2023
libraw vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
LibRaw could be made to crash if it opened a specially crafted file.
Software Description: - libraw: raw image decoder library
Details:
It was discovered that LibRaw incorrectly handled certain photo files. If a user o automated system were tricked into processing a specially crafted photo file, a remote attacker could possibly cause applications linked against LibRaw to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS: libraw19 0.19.5-1ubuntu1.3
After a standard system update you need to restart your session to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6377-1 CVE-2020-22628
Package Information: https://launchpad.net/ubuntu/+source/libraw/0.19.5-1ubuntu1.3
--------------YaC6AlWVb8Y2UB8mSQAYlbXP--
--------------hx2NbjLqFWEX90x9nhBfa0Um Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmUIe80ACgkQZWnYVadE vpNzWA/5AYZuzbs0sJICVlNcg1xAGa1nJ8ApWm46EFxTvZFcRjd/9afPQiT7FYAF mx2lt/02Cd4meQaFgCrZot8NoGY9a+sQv/mKeVF0FSZqNJFyz3X9TF24hWTpAQtW NYEA2zkDukVeja0Ic/300qS2BD8uA0FzBZAe9ufJVZRhlac96sAOY21goRUcXFE6 9YVcxrTXCWNERgnzaEsYwY+zC4Ze3MI0uzVczQu9aHNG2vI0itTuUZt8Gf6HhD3U SFVK58klucwRVid31xyvL2tnK13Zgn6pcxTIiywLMS9SJkjTo1yv4e5rDKJms9ZA c9H6P4u59PQ8xrQ4j65kSo4fClQ9QQeR2Dms4C3SzTETMR238EGoJTUm3DImgHP2 E4ifZKjhSnG7J0Co+89s3grwBGYXDWD6pdGhQlTDcF6GZWeExOi+vlCuXscVQScJ rokYKhpL2KpXawHwMJKF0AMwfxcpzMV2lrBCNltMF+WZCDJ+HJKvQoZhnf+qKqk+ 66ToGhRZIxtpP0o8ZstvjGkdji2kfHJELa4hQFjKvL4M8A2CiSx/++jaT3xsoi7x 7u63deZxXFxypD6CnYB4hmoDzW0Ge4p9ZznbFNNZXhyn550QhHo5vLpJDXpghAzS lu/Kj9zGujEEg9USwYxzQpk4f7Un2EPSAR1wwHpAAGWV1FNicSM= =0hPa -----END PGP SIGNATURE-----
--------------hx2NbjLqFWEX90x9nhBfa0Um--
--===============6922671490681709554== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============6922671490681709554==--
|
|
|
|