You are here
Home > Preporuke > Ranjivost programskih paketa cups-filters i cups

Ranjivost programskih paketa cups-filters i cups

  • Detalji os-a: LDE
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-
Debian Security Advisory DSA-2875-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 12, 2014 http://www.debian.org/security/faq
– ————————————————————————-

Package : cups-filters
CVE ID : CVE-2013-6474 CVE-2013-6475 CVE-2013-6476

Florian Weimer of the Red Hat Product Security Team discovered multiple
vulnerabilities in the pdftoopvp CUPS filter, which could result in the
execution of aribitrary code if a malformed PDF file is processed.

For the stable distribution (wheezy), these problems have been fixed in
version 1.0.18-2.1+deb7u1.

For the unstable distribution (sid), these problems have been fixed in
version 1.0.47-1.

We recommend that you upgrade your cups-filters packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=wuXA
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140312154441.GB3072@pisco.westfalen.local

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-
Debian Security Advisory DSA-2876-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 12, 2014 http://www.debian.org/security/faq
– ————————————————————————-

Package : cups
CVE ID : CVE-2013-6474 CVE-2013-6475 CVE-2013-6476

Florian Weimer of the Red Hat Product Security Team discovered multiple
vulnerabilities in the pdftoopvp CUPS filter, which could result in the
execution of aribitrary code if a malformed PDF file is processed.

For the oldstable distribution (squeeze), these problems have been fixed in
version 1.4.4-7+squeeze4.

For the stable distribution (wheezy) and the unstable distribution (sid)
the filter is now part of the cups-filters source package.

We recommend that you upgrade your cups packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=FIwh
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140312154520.GC3072@pisco.westfalen.local

AutorTomislav Protega
Cert idNCERT-REF-2014-03-0025-ADV
CveCVE-2013-6474 CVE-2013-6475 CVE-2013-6476
ID izvornikaDSA-2875-1 DSA-2876-1
Proizvodcups-filters i cups
Izvorhttp://www.debian.org
Top
More in Preporuke
Ranjivost programskog paketa mutt

Otkrivena je ranjivost preljeva spremnika u programskom paketu mutt za Debian OS. Ranjivost se mogla očitovati DoS stanjem ili potencijalnim...

Close