drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in poppler
Name: |
Ausführen beliebiger Kommandos in poppler |
|
ID: |
MDVSA-2008:089 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva Corporate 4.0 |
|
Datum: |
Fr, 18. April 2008, 04:00 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693 |
|
Applikationen: |
poppler |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1208484032-11275-2845
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:089 http://www.mandriva.com/security/ _______________________________________________________________________ Package : poppler Date : April 17, 2008 Affected: Corporate 4.0 _______________________________________________________________________ Problem Description: Kees Cook of Ubuntu security found a flaw in how poppler prior to version 0.6 displayed malformed fonts embedded in PDF files. An attacker could create a malicious PDF file that would cause applications using poppler to crash, or possibly execute arbitrary code when opened (CVE-2008-1693). The updated packages have been patched to correct this issue. _______________________________________________________________________
References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693 _______________________________________________________________________ Updated Packages: Corporate 4.0: 4701915c12ecf895dcb4772a31d1deca corporate/4.0/i586/libpoppler0-0.4.1-3.7.20060mlcs4.i586.rpm c36f50db21bdb368aadfcb518c1309e6 corporate/4.0/i586/libpoppler0-devel-0.4.1-3.7.20060mlcs4.i586.rpm 0e79560be87df742afeaae41956d075a corporate/4.0/i586/libpoppler-qt0-0.4.1-3.7.20060mlcs4.i586.rpm c4dc210352c366f877372ebb941a9ed2 corporate/4.0/i586/libpoppler-qt0-devel-0.4.1-3.7.20060mlcs4.i586.rpm a0835933cb055b6ed7b7d7bbe8de0d06 corporate/4.0/SRPMS/poppler-0.4.1-3.7.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 10f7767b01ec173c2c7ad69ec7ba1fb1 corporate/4.0/x86_64/lib64poppler0-0.4.1-3.7.20060mlcs4.x86_64.rpm 47a486fbf806c84175cbb101ef86a2e9 corporate/4.0/x86_64/lib64poppler0-devel-0.4.1-3.7.20060mlcs4.x86_64.rpm d206062518205787f3938681d401c543 corporate/4.0/x86_64/lib64poppler-qt0-0.4.1-3.7.20060mlcs4.x86_64.rpm 9954016767660f2cdc85ba6a10346dcb corporate/4.0/x86_64/lib64poppler-qt0-devel-0.4.1-3.7.20060mlcs4.x86_64.rpm a0835933cb055b6ed7b7d7bbe8de0d06 corporate/4.0/SRPMS/poppler-0.4.1-3.7.20060mlcs4.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIB9WumqjQ0CJFipgRApjuAJ4wKniF15dS/Xiao16L2rP7joThiACgkQK+ oL+++bKTKDIC0pZo9y9Cnwk= =g9ap -----END PGP SIGNATURE-----
------------=_1208484032-11275-2845 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________
------------=_1208484032-11275-2845--
|
|
|
|