You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa gdk-pixbuf

Sigurnosni nedostatak programskog paketa gdk-pixbuf

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2722-1
August 26, 2015

gdk-pixbuf vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.04
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

GDK-PixBuf could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
– gdk-pixbuf: GDK Pixbuf library

Details:

Gustavo Grieco discovered that GDK-PixBuf incorrectly handled scaling
bitmap images. If a user or automated system were tricked into opening a
BMP image file, a remote attacker could use this flaw to cause GDK-PixBuf
to crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
libgdk-pixbuf2.0-0 2.31.3-1ubuntu0.1

Ubuntu 14.04 LTS:
libgdk-pixbuf2.0-0 2.30.7-0ubuntu1.1

Ubuntu 12.04 LTS:
libgdk-pixbuf2.0-0 2.26.1-1ubuntu1.2

After a standard system update you need to restart your session to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2722-1
CVE-2015-4491

Package Information:
https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.31.3-1ubuntu0.1
https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.30.7-0ubuntu1.1
https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.26.1-1ubuntu1.2

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=sm3a
—–END PGP SIGNATURE—–

AutorMarko Stanec
Cert idNCERT-REF-2015-08-0005-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni propust programskog paketa twig

Otkriven je sigurnosni propust u programskom paketu twig za operacijski sustav Debian. Otkriveni propust potencijalnim udaljenim napadačima omogućuje izvršavanje proizvoljnog...

Close