|
|
Subscribe / Log in / New account

Ubuntu alert USN-2951-1 (optipng)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-2951-1] OptiPNG vulnerabilities
Date:  Mon, 18 Apr 2016 09:13:20 -0400
Message-ID:  <5714DD70.8080100@canonical.com>

========================================================================== Ubuntu Security Notice USN-2951-1 April 18, 2016 optipng vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: OptiPNG could be made to crash or run programs as your login if it opened a specially crafted file. Software Description: - optipng: advanced PNG (Portable Network Graphics) optimizer Details: Gustavo Grieco discovered that OptiPNG incorrectly handled memory. A remote attacker could use this issue with a specially crafted image file to cause OptiPNG to crash, resulting in a denial of service. (CVE-2015-7801) Gustavo Grieco discovered that OptiPNG incorrectly handled memory. A remote attacker could use this issue with a specially crafted image file to cause OptiPNG to crash, resulting in a denial of service. (CVE-2015-7802) Hans Jerry Illikainen discovered that OptiPNG incorrectly handled memory. A remote attacker could use this issue with a specially crafted image file to cause OptiPNG to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-2191) Henri Salo discovered that OptiPNG incorrectly handled memory. A remote attacker could use this issue with a specially crafted image file to cause OptiPNG to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-3981) Henri Salo discovered that OptiPNG incorrectly handled memory. A remote attacker could use this issue with a specially crafted image file to cause OptiPNG to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-3982) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: optipng 0.7.5-1ubuntu0.1 Ubuntu 14.04 LTS: optipng 0.6.4-1ubuntu0.14.04.1 Ubuntu 12.04 LTS: optipng 0.6.4-1ubuntu0.12.04.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2951-1 CVE-2015-7801, CVE-2015-7802, CVE-2016-2191, CVE-2016-3981, CVE-2016-3982 Package Information: https://launchpad.net/ubuntu/+source/optipng/0.7.5-1ubunt... https://launchpad.net/ubuntu/+source/optipng/0.6.4-1ubunt... https://launchpad.net/ubuntu/+source/optipng/0.6.4-1ubunt... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds