-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.0908
                   USN-3912-1: GDK-PixBuf vulnerability
                               21 March 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gdk-pixbuf
Publisher:         Ubuntu
Operating System:  Ubuntu
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-12447  

Original Bulletin: 
   https://usn.ubuntu.com/3912-1/

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Ubuntu. It is recommended that administrators 
         running gdk-pixbuf check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-3912-1: GDK-PixBuf vulnerability

20 March 2019

gdk-pixbuf vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  o Ubuntu 16.04 LTS

Summary

GDK-PixBuf could be made to crash or run programs as your login if it opened a
specially crafted file.

Software Description

  o gdk-pixbuf - GDK Pixbuf library

Details

It was discovered that the GDK-PixBuf library did not properly handle certain
BMP images. If an user or automated system were tricked into opening a
specially crafted BMP file, a remote attacker could use this flaw to cause
GDK-PixBuf to crash, resulting in a denial of service, or possibly execute
arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 16.04 LTS
    libgdk-pixbuf2.0-0 - 2.32.2-1ubuntu1.6

To update your system, please follow these instructions: https://
wiki.ubuntu.com/Security/Upgrades .

After a standard system update you need to restart your session to make all the
necessary changes.

References

  o CVE-2017-12447

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=qFyj
-----END PGP SIGNATURE-----