drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in MuPDF
Name: |
Zwei Probleme in MuPDF |
|
ID: |
DSA-3655-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian jessie |
|
Datum: |
Sa, 27. August 2016, 10:25 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6265
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6525 |
|
Applikationen: |
MuPDF |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3655-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 26, 2016 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : mupdf CVE ID : CVE-2016-6265 CVE-2016-6525 Debian Bug : 832031 833417
Two vulnerabilities were discovered in MuPDF, a lightweight PDF viewer. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2016-6265
Marco Grassi discovered a use-after-free vulnerability in MuPDF. An attacker can take advantage of this flaw to cause an application crash (denial-of-service), or potentially to execute arbitrary code with the privileges of the user running MuPDF, if a specially crafted PDF file is processed.
CVE-2016-6525
Yu Hong and Zheng Jihong discovered a heap overflow vulnerability within the pdf_load_mesh_params function, allowing an attacker to cause an application crash (denial-of-service), or potentially to execute arbitrary code with the privileges of the user running MuPDF, if a specially crafted PDF file is processed.
For the stable distribution (jessie), these problems have been fixed in version 1.5-1+deb8u1.
We recommend that you upgrade your mupdf packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXwKTVAAoJEAVMuPMTQ89E4dMP/R4IElp3S0LNj7s6pY8spIro 2dLuI70yFM1ZgP+9umrYQ1m/YURlJilZ8KKF2ctAX4nYKUHiHnmc3HSa2QUB9GB/ 8QvVYxCqz918XHElV9ox7/UZP++MoErFmwHlrhWe0IBP1uohacbj/Fs0OgXO8PEA rK8jAColSQbpVfHU9QqsiqzyXXanztIJpGMxuaNAdSzdZWQhwZ3cG38yJ3uQ2bsF P3HZafgAkiPcKSo/kNF9P+CfRS0u9KvwtyN7leT38k4WwGLRanYRen2v2Oco+3T0 brLPlASnylqT3zkppk7gnGsqu8wvy1pEkhPCLAsc65FAccUhNF7QLGv+rpUoTCcE O9oB22CMHMloLGbltLpNzlYdHJPkz/SSgHBpWysvuXQ1KrF57Lx+c1lgzTV7a0T2 UwjOHchbbCl80xKfOdBN0drlKxx66sFK5PiFy7OYa0x2Ww7CNO4RY66vtPmS9Nvm RQNaOoLXgVUESE/pmeTYJjQpwXCgM0ghORHNw9biB7wbcwB4qC0Xyc9C+YLSCXQ3 3jSU0Bzip1NN+iI2RLtWP2s1feWEbM9YDjj346bV3eGXRw6SI895evTvSJqirFcP 7yhRNmRsikmsM5MJFzvhA/YielEIf+YXUCJ7uzikxbZ00ABEjuUN6cwpvsMWZJta /clmSL1QGp3mPnLpr2d5 =TD/r -----END PGP SIGNATURE-----
|
|
|
|