drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Pygments
Name: |
Ausführen beliebiger Kommandos in Pygments |
|
ID: |
USN-2862-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.04, Ubuntu 15.10 |
|
Datum: |
Do, 7. Januar 2016, 21:56 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8557 |
|
Applikationen: |
Pygments |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============8843789180950951028== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="PEar0vE7cNVXxWM5i853kQ6tGEgkA5t9t"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --PEar0vE7cNVXxWM5i853kQ6tGEgkA5t9t Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2862-1 January 07, 2016
pygments vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10 - Ubuntu 15.04 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Pygments could be made to crash or run programs if it processed a specially crafted font request.
Software Description: - pygments: syntax highlighting package written in Python
Details:
It was discovered that Pygments incorrectly sanitized strings used to search system fonts. An attacker could possibly use this issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: python-pygments 2.0.1+dfsg-1.1svn1.1 python3-pygments 2.0.1+dfsg-1.1svn1.1
Ubuntu 15.04: python-pygments 2.0.1+dfsg-1svn1.1 python3-pygments 2.0.1+dfsg-1svn1.1
Ubuntu 14.04 LTS: python-pygments 1.6+dfsg-1ubuntu1.1 python3-pygments 1.6+dfsg-1ubuntu1.1
Ubuntu 12.04 LTS: python-pygments 1.4+dfsg-2ubuntu0.1 python3-pygments 1.4+dfsg-2ubuntu0.1
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2862-1 CVE-2015-8557
Package Information: https://launchpad.net/ubuntu/+source/pygments/2.0.1+dfsg-1.1svn1.1 https://launchpad.net/ubuntu/+source/pygments/2.0.1+dfsg-1svn1.1 https://launchpad.net/ubuntu/+source/pygments/1.6+dfsg-1ubuntu1.1 https://launchpad.net/ubuntu/+source/pygments/1.4+dfsg-2ubuntu0.1
--PEar0vE7cNVXxWM5i853kQ6tGEgkA5t9t Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJWjm/5AAoJEGVp2FWnRL6TYDUQAILpfb4X00+jHkjsHuwK2fp0 AyWVPJ6XQIddDCzBSVTfoXMli02IAA6cu4buQYoIkgvBzDDg7umYKG8cfwGY6bCu 1+tyn1Fdx31HgTJR53RY24l2SZEUmhLTG90V+HehgQu3dHZNC9yDOcfdC7zzVKx8 /BaDqbaRxj8MWENrjGQLKyew0lBZZDeL0QqIVboSQDleM0Yty6MrUZMDUwNwy1qw 7JAoBglO7qLhfj1ZyGWnJvszk+8NRKfKvlnBRAD330FwS7MfJWdudhu+7RIora1n 3qpKUBubU2sESewS+zr56fvllGYycIJn6wFYLocUMg3glXSMSrAGfoO82stRlXIa tybsWvm7U2Lw7Pp2QUpO91I9+RjvrD3lES6Sr12vqrHhviEt90foTXuaNzJ9dzXS s0x7ZhpsES9JnjTKDmvAAj0Y9xF4xCG7G5FwqNK1vJ9bSnNqscCQx+Snqa/POlqP PKae/bzc8M8DRrcPNhtY3WTZl6SalppuCRjjqeEtpGvZ9FVoi7Ft0qX24xMsJUH+ E0HNZsVVT1D+EGlB9wqLTVdao+tvtWINGHNDqGlixsOfiip/jrONix5RxrgGiq9P jvYraY81EUNrW3XW5RuDmr4cfXP9rg6kg5x+fZi87FDc0g8BXlslldwQtatxHaYc fO6VbOcVIPiMTMufpNi2 =/5sA -----END PGP SIGNATURE-----
--PEar0vE7cNVXxWM5i853kQ6tGEgkA5t9t--
--===============8843789180950951028== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============8843789180950951028==--
|
|
|
|