-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2876-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff March 12, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : cups CVE ID : CVE-2013-6474 CVE-2013-6475 CVE-2013-6476 Florian Weimer of the Red Hat Product Security Team discovered multiple vulnerabilities in the pdftoopvp CUPS filter, which could result in the execution of aribitrary code if a malformed PDF file is processed. For the oldstable distribution (squeeze), these problems have been fixed in version 1.4.4-7+squeeze4. For the stable distribution (wheezy) and the unstable distribution (sid) the filter is now part of the cups-filters source package. We recommend that you upgrade your cups packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJTIICHAAoJEBDCk7bDfE42ykQP/33q8OPEizgpQ++PXq6RvnLK hVXyN9T6xUuVFw3VVAsyWTigK86BnnXAww1cDpIH157iGw7vC7ih2t+KOPndBH3K eUE6wUpq+KYV/3iw74hMHjCQk+Nc8Al0njMofht8J5Qtw3+w0QPV0naKDqZc5yAm 6H2SFNnOgS6APqNvPwgPSrk3OiJFMmCybjNeDuf3/h83I2DDA5LVhzSdQOCnQ8TM oZNYgmVS6//sAejoJkXQHXC1VvNKJmFUmH0G06DeB0j4/rJxj0p+/GrjCLhhW1ym i313NzJaus0oQaGIAQmyvtF4pcCjiBdo+Ea8XG2LAl9drW35YAPabzQQVGxc2mBp O2LI7bWFYKuB18ZvQDe4c6pjHuloAZ5agcht1qjWu9YwNOUo/6nw4Dgi4mGpv6F7 URO3+S49yLscu4Lxs7/uitou8EIKaRdNR3bHPwNmw/YJoz29BNQs2BDdtjPq05/i 53RD+4IIiuj8cadA9V1CFml5A8PaYlyO+XD6vFEIP+uiDKWGdOYSB5Hszo8bNCJq hFgcsTENel8u2nwbhehER3XYhn+aTn4IwXI7zjzZ3/fas8Aou34McZ2sEiwB0wDq 1985auB9bJP0PaMuFjBlaeonb2svYZCBk4qWuBVaEgtqKrUYFeFY3+HblaXvHat0 Rlk83y2bQfqtFfDURTji =FIwh -----END PGP SIGNATURE-----