USN-2898-1: GTK+ vulnerability
15 February 2016
GTK+ could be made to crash or run programs as your login if it processed a specially crafted image.
Releases
Packages
Details
It was discovered that GTK+ incorrectly handled certain large images. A
remote attacker could use this issue to cause GTK+ applications to crash,
resulting in a denial of service, or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10
Ubuntu 14.04
Ubuntu 12.04
After a standard system update you need to restart your session to make
all the necessary changes.
References
Related notices
- USN-2898-2: eog-dev, eog