—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
– ————————————————————————-
Debian Security Advisory DSA-2951-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
June 05, 2014 http://www.debian.org/security/faq
– ————————————————————————-
Package : mupdf
CVE ID : CVE-2014-2013
It was discovered that a buffer overflow in the MuPDF viewer might lead
to the execution of arbitrary code.
For the stable distribution (wheezy), this problem has been fixed in
version 0.9-2+deb7u2.
For the testing distribution (jessie), this problem has been fixed in
version 1.3-2.
For the unstable distribution (sid), this problem has been fixed in
version 1.3-2.
We recommend that you upgrade your mupdf packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=afmm
—–END PGP SIGNATURE—–
—
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140605202532.GA2404@pisco.westfalen.local