You are here
Home > Preporuke > Ranjivost programskog paketa jbigkit

Ranjivost programskog paketa jbigkit

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2190-1
May 01, 2014

jbigkit vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS
– Ubuntu 13.10
– Ubuntu 12.10

Summary:

JBIG-KIT could be made to crash or run programs if it processed a specially
crafted image file.

Software Description:
– jbigkit: JBIG1 data compression library

Details:

Florian Weimer discovered that JBIG-KIT incorrectly handled certain
malformed images. If a user or automated system were tricked into
processing a specially crafted image, JBIG-KIT could be made to crash, or
possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
libjbig0 2.0-2ubuntu4.1

Ubuntu 13.10:
libjbig0 2.0-2ubuntu1.13.10.1

Ubuntu 12.10:
libjbig0 2.0-2ubuntu1.12.10.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2190-1
CVE-2013-6369

Package Information:
https://launchpad.net/ubuntu/+source/jbigkit/2.0-2ubuntu4.1
https://launchpad.net/ubuntu/+source/jbigkit/2.0-2ubuntu1.13.10.1
https://launchpad.net/ubuntu/+source/jbigkit/2.0-2ubuntu1.12.10.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/

iQIcBAEBCgAGBQJTYoppAAoJEGVp2FWnRL6T2q8QAJZNa629LqudcIvOmBBBmMs5
gtae1F5liM6v56iKxRQ3KGSGRJA0UPhZatR+U6t4R/20UhGXAgNxf4RckAffG+qB
2YWkN6jWmTXl78B3Oxb/EMQBCMtjkdhqe7Mw/b27ix4AU+HfDwMk+0Wb+ML/OGHa
zy5RvfOCXXeOvwMGqfXj3hBdl40biE1GI3JditnbTIYP/LRbNgWMlJmdyrM1NJyD
YbCPnJdBYaaa9ev6LDPXYxNDt4OiEs789xnHq4O6RcCeuXkuUEzw5uOXzg9wgdmr
YyjkBMQtdvf0hvtq4wDU6Mtd7tg9RVWqUqHF/fOaTejyiuete/AUyq1Q0ktN46mi
WoBJyyJSws/rkiTH2tiqevRO/gJmpDYzPKI/PxbDu3acMOjmbHCBWtEcMH+S8aS1
HOe/awMV94DZ2+KbB80sflNQvESBA1oc/HxoooDV5wfsiDviRjW7e0WrKJPfrWbJ
aN7YBWIvGRXkgpfj99fvqlonwjOvR/6r8SSGqRV03KyNZwJVfckMOlo3y47D5O0G
9+NxIBqjud0uuokFIaAG3DD5WHLuUjbhek1hfe3Q+XY5IFlSsSGnb2JEz2K0RBUG
7QBSn/G7TWfzatlr3rnlKD1SV0ptqQY5dQCbo3Dxe/6hiBfamCyGEzDIib1NblGE
smoNb1Cyzum/Lqs9/wN/
=WsJZ
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2014-05-0012-ADV
CveCVE-2013-6369
ID izvornikaUSN-2190-1
Proizvodjbigkit
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Sigurnosni propust programskog paketa python-pillow

Otkriven je sigurnosni propust u skriptama JpegImagePlugin.py i EpsImagePlugin.py unutar PIL (Python Imaging Library) biblioteke. PIL je koristio nazive privremenih...

Close