Mehrere Probleme in poppler
ID: | USN-2958-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10 |
Datum: | Mo, 2. Mai 2016, 23:06 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4473 |
Applikationen: | poppler |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4250411722658601685== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="qtkE9W4EnJIttO6gGqQtIE5iKIfACSExs" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --qtkE9W4EnJIttO6gGqQtIE5iKIfACSExs Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-2958-1 May 02, 2016 poppler vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: poppler could be made to crash or run programs if it opened a specially crafted file. Software Description: - poppler: PDF rendering library Details: It was discovered that the poppler pdfseparate tool incorrectly handled certain filenames. A local attacker could use this issue to cause the tool to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 12.04 LTS. (CVE-2013-4473, CVE-2013-4474) It was discovered that poppler incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or possibly execute arbitrary code with privileges of the user invoking the program. (CVE-2015-8868) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: libpoppler-cpp0 0.33.0-0ubuntu3.1 libpoppler-glib8 0.33.0-0ubuntu3.1 libpoppler-qt4-4 0.33.0-0ubuntu3.1 libpoppler-qt5-1 0.33.0-0ubuntu3.1 libpoppler52 0.33.0-0ubuntu3.1 poppler-utils 0.33.0-0ubuntu3.1 Ubuntu 14.04 LTS: libpoppler-cpp0 0.24.5-2ubuntu4.4 libpoppler-glib8 0.24.5-2ubuntu4.4 libpoppler-qt4-4 0.24.5-2ubuntu4.4 libpoppler-qt5-1 0.24.5-2ubuntu4.4 libpoppler44 0.24.5-2ubuntu4.4 poppler-utils 0.24.5-2ubuntu4.4 Ubuntu 12.04 LTS: libpoppler-cpp0 0.18.4-1ubuntu3.2 libpoppler-glib8 0.18.4-1ubuntu3.2 libpoppler-qt4-3 0.18.4-1ubuntu3.2 libpoppler19 0.18.4-1ubuntu3.2 poppler-utils 0.18.4-1ubuntu3.2 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2958-1 CVE-2013-4473, CVE-2013-4474, CVE-2015-8868 Package Information: https://launchpad.net/ubuntu/+source/poppler/0.33.0-0ubuntu3.1 https://launchpad.net/ubuntu/+source/poppler/0.24.5-2ubuntu4.4 https://launchpad.net/ubuntu/+source/poppler/0.18.4-1ubuntu3.2 --qtkE9W4EnJIttO6gGqQtIE5iKIfACSExs Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCgAGBQJXJ5HQAAoJEGVp2FWnRL6Tnt4P/i5Rc6cepcAUIlwO6Ewch0Ys Q/ZTH8p96pN9geZFkPkxqYljOeX+rszdyCei6t4bKx0uRjiIovDI4vvaXs90oWt0 G91nH/CS0Rik7hiwyvKPHKH3GgZx3OJ5j3+S+8FJd/5Z4ffhPRv8Wjh0H8UVZhnA 5WsI4Ox6Z51XWCH6wgsJ/efZjE5QxebcAT+MZ+ZqqrR+GBCQect14ai+pj6QoOp9 1Sy9xZmP7Tedcsc5nvcxgoKUzbPH9i7Dlz7FEpIM3imtLqQoeOrqAV5TxDwsc8Mo //EBjDdy7ZnKF9qHcoSvu3btg+l8h2iRiv2mEETSTs0oO7g0ev6iGkeQUkgkQ9pQ aa1xO0BLULfV+MVXf1RzCjygWfSw4rcHgnKPafTQMok3bk5AnQXx7a/Tx1u/fDEV PrjxFq34Ke+O1IR/rzUlFznjNufx7o5MK3LWk+vwdDQZcfeuRzmAYYum+X12XWe7 hOGxsznGkwT6SkBahjq/Pu1L68Mgp6IA4C6cFa19gQFDMlJ5848dfAEnWD8UQQ/R j+N405uyJcDDrxy0dYZk441Y6npmRwzHzQBghTy45lTESWeQsaBre2pY/PJSEMOb iXexmLLcGCiXO8dXji6oa0uaLk9TT96eaJ7w5dMmgHvf+GlLAwLrBm+1jfE91HKe n4evjwScTU81AX6wruxT =zN4n -----END PGP SIGNATURE----- --qtkE9W4EnJIttO6gGqQtIE5iKIfACSExs-- --===============4250411722658601685== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============4250411722658601685==-- |