drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Ghostscript (Aktualisierung)
Name: |
Ausführen beliebiger Kommandos in Ghostscript (Aktualisierung) |
|
ID: |
USN-2434-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS |
|
Datum: |
Mo, 8. Dezember 2014, 16:39 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029 |
|
Applikationen: |
AFPL Ghostscript |
|
Update von: |
Ausführen beliebiger Kommandos in JasPer |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4240030353266879464== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="DRC4doCTHvKCbRuno4JvBdNHw3GVIXX2S"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --DRC4doCTHvKCbRuno4JvBdNHw3GVIXX2S Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2434-2 December 08, 2014
ghostscript vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Ghostscript could be made to crash or run programs as your login if it opened a specially crafted file.
Software Description: - ghostscript: PostScript and PDF interpreter
Details:
USN-2434-1 fixed a vulnerability in JasPer. This update provides the corresponding fix for the JasPer library embedded in the Ghostscript package.
Original advisory details:
Jose Duart discovered that JasPer incorrectly handled certain malformed JPEG-2000 image files. If a user were tricked into opening a specially crafted JPEG-2000 image file, a remote attacker could cause JasPer to crash or possibly execute arbitrary code with user privileges.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04 LTS: libgs8 8.71.dfsg.1-0ubuntu5.6
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2434-2 http://www.ubuntu.com/usn/usn-2434-1 CVE-2014-9029
Package Information: https://launchpad.net/ubuntu/+source/ghostscript/8.71.dfsg.1-0ubuntu5.6
--DRC4doCTHvKCbRuno4JvBdNHw3GVIXX2S Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJUhbogAAoJEGVp2FWnRL6ThR0P/0rmsuHx8DxY0g3kchdRy1+f +Z2uqob6xDFpFpkVZPggPnqDFsnfibpzzOoFHUh3aPVlU3YQ3z1Fy0GHVlhBXFPO 2MlLXr7573mjNgjOdeu+kp2pkeeN/t88mmFgd+e6G6RRUps7/URPM8NSq2+EsNvf bl62MszpWIAi9mc4LN+SvZgcoAywRZuUq4gcbOsIsDJYp1uCcc5tQKXhIrf78zEc JKDaPgQ/+ux0LHcRmHb/z4ryTkE4z6Ggyy3WSjt5Wy76Fen0HT8tAzSKCqjpVUUh irzTJ52ZfmgtXTkW9Puo4N+tJQR3YhcMDjqGkTNsS7k9O2nQVGziqsdP+qJcu64+ pcRH5aAYxpaW/vawChnp7z/Gl96qnwYIpX3cgmcHlts0zCKUjrQvrtTSl84uxP9P AWOtbWLHubyOvhwyRRccGjTldDWdf3GiMJEtMRvubELaHoBTI/4v/m2ZfFFAP5wO Oip48RCu3+gPDtIHcmd2PtJG0/63k/30ewjlVIG+auyEX9acuhpfvCwEz1HPlbgh MPFryoE4Cq/nE5TREdHRA5NkOVsgcxxCErFufCBYf0RHVkhvBDkYVIfHfqm5+BHT hqqhEWCrPGrY9Vvuq7Hl/mv+Z+ltRFSz651RZJMec+CzmCnybEpog2TffcK7PdhI LKdkSJT/e4MWzO4+yHUN =+F8W -----END PGP SIGNATURE-----
--DRC4doCTHvKCbRuno4JvBdNHw3GVIXX2S--
--===============4240030353266879464== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============4240030353266879464==--
|
|
|
|