ESB-2017.2361 - [Debian] gdk-pixbuf: Execute arbitrary code/commands - Remote with user interaction 2017-09-19

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2361
                        gdk-pixbuf security update
                             19 September 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gdk-pixbuf
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Debian GNU/Linux 9
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-2862  

Reference:         ESB-2017.2207

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3978

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3978-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 18, 2017                    https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : gdk-pixbuf
CVE ID         : CVE-2017-2862
Debian Bug     : 874552

Marcin Noga discovered a buffer overflow in the JPEG loader of the GDK
Pixbuf library, which may result in the execution of arbitrary code if
a malformed file is opened.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.31.1-2+deb8u6.

For the stable distribution (stretch), this problem has been fixed in
version 2.36.5-2+deb9u1.

We recommend that you upgrade your gdk-pixbuf packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=AohV
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=8hZT
-----END PGP SIGNATURE-----

« Back to bulletins