drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in xpdf
Name: |
Mehrere Probleme in xpdf |
|
ID: |
SSA:2006-045-09 |
|
Distribution: |
Slackware |
|
Plattformen: |
Slackware -current, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2 |
|
Datum: |
Mi, 15. Februar 2006, 01:39 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301 |
|
Applikationen: |
xpdf |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] xpdf (SSA:2006-045-09)
New xpdf packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix security issues.
More details about the issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301
Here are the details from the Slackware 10.2 ChangeLog: +--------------------------+ patches/packages/xpdf-3.01-i486-3.tgz: Recompiled with xpdf-3.01pl2.patch to fix integer and heap overflows in xpdf triggered by malformed PDF files. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301 (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Updated package for Slackware 9.0: xpdf-3.01-i386-3.tgz
Updated package for Slackware 9.1: xpdf-3.01-i486-3.tgz
Updated package for Slackware 10.0: xpdf-3.01-i486-3.tgz
Updated package for Slackware 10.1: xpdf-3.01-i486-3a.tgz
Updated package for Slackware 10.2: xpdf-3.01-i486-3.tgz
Updated package for Slackware -current: xpdf-3.01-i486-3.tgz
MD5 signatures: +-------------+
Slackware 9.0 package: febda74afb06e94f745ef2d02867b505 xpdf-3.01-i386-3.tgz
Slackware 9.1 package: 1dd5847ecf094359fe712850391e7b37 xpdf-3.01-i486-3.tgz
Slackware 10.0 package: abd65f71b8484579aa4b1ce081b4d61e xpdf-3.01-i486-3.tgz
Slackware 10.1 package: 9270fb578380221d9e642c7d80fac931 xpdf-3.01-i486-3a.tgz
Slackware 10.2 package: 8c85579182d43d56920e5a79063b447e xpdf-3.01-i486-3.tgz
Slackware -current package: 172d66fd19dbf8ceca0a25a6c17e75c2 xpdf-3.01-i486-3.tgz
Installation instructions: +------------------------+
Upgrade the package as root: # upgradepkg xpdf-3.01-i486-3.tgz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.7 (GNU/Linux)
iD8DBQFD8mxGakRjwEAQIjMRAhp3AKCVQpWnZHdim3VD3ih929pa3lIlNACbBy8F ivdQ71XfCbxc6KWC+SGnL7g= =gzqu -----END PGP SIGNATURE-----
|
|
|
|