Linux Security
    Linux Security
    Linux Security

    Debian: New xpdf packages fix several problems

    Date 02 Mar 2006
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 984-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    March 2nd, 2006               
    - --------------------------------------------------------------------------
    Package        : xpdf
    Vulnerability  : several
    Problem type   : local (remote)
    Debian-specific: no
    Derek Noonburg has fixed several potential vulnerabilities in xpdf,
    the Portable Document Format (PDF) suite.
    The old stable distribution (woody) does not seem to be affected.
    For the stable distribution (sarge) these problems have been fixed in
    version 3.00-13.6.
    For the unstable distribution (sid) these problems have been fixed in
    version 3.01-7.
    We recommend that you upgrade your xpdf packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      781 3b09a41551eb88e135d4c1545edc3897
          Size/MD5 checksum:    51817 20487e64403271f8193ddc959ff46d06
          Size/MD5 checksum:   534697 95294cef3031dd68e65f331e8750b2c2
      Architecture independent components:
          Size/MD5 checksum:    56592 49fcfd17053fba4b288e0ce69660f108
          Size/MD5 checksum:     1284 91afb670cc3c9c19fb1e153c650f5fc1
      Alpha architecture:
          Size/MD5 checksum:   802784 6db7693ed94beda4f4918e8a639e0165
          Size/MD5 checksum:  1528860 edaa31b0b8c87b8605f4fddbe5197826
      AMD64 architecture:
          Size/MD5 checksum:   668468 6038c7858722032cef42823af1ceb27d
          Size/MD5 checksum:  1275066 cad43af52cea66d5e2e046eaf0b0c734
      ARM architecture:
          Size/MD5 checksum:   675102 933e77479fa35243f25b9cf0a7af9960
          Size/MD5 checksum:  1279998 a2618d91a020e91f4a543526b00bab7e
      Intel IA-32 architecture:
          Size/MD5 checksum:   657110 7da2961c7030f4753ea677d40c7e8264
          Size/MD5 checksum:  1242800 1fe93e71851091093ad61e0fc9e207ef
      Intel IA-64 architecture:
          Size/MD5 checksum:   951326 055fe0db7d1f7111cc6370f65d45f439
          Size/MD5 checksum:  1802816 f9168deac0eda96b115bde2fbbf422e6
      HP Precision architecture:
          Size/MD5 checksum:   833234 53a85c49c0d0ed760da1ac5bd256cc1c
          Size/MD5 checksum:  1581132 b830198ef741369f777e4a231c2b2352
      Motorola 680x0 architecture:
          Size/MD5 checksum:   586338 a951da441c2a3288622b116932faa42d
          Size/MD5 checksum:  1117564 2fa1b6c62f770dbae84a02ca274fc0be
      Big endian MIPS architecture:
          Size/MD5 checksum:   808166 590198eb28d9ed0d6b32be9d1bac320b
          Size/MD5 checksum:  1525622 64de5bac988b7dc970cbf4e2ac5c991e
      Little endian MIPS architecture:
          Size/MD5 checksum:   798476 f269b9c1fc2ed4b90c32f4c53b0a8c91
          Size/MD5 checksum:  1504284 998fc34caadad1809fcb5bfe8d9dccd1
      PowerPC architecture:
          Size/MD5 checksum:   694632 bc97e0eb5dbaa07f107507d5f956f1c6
          Size/MD5 checksum:  1313730 8851ce3bb1bc3fd71a3e6ced3080e392
      IBM S/390 architecture:
          Size/MD5 checksum:   631038 0ffbacdcf61d48ba58c27c3a21156520
          Size/MD5 checksum:  1199354 3d551ef88027086a58bbe6e2312728fe
      Sun Sparc architecture:
          Size/MD5 checksum:   626786 9ab324a84408a8ab36b6d334d8ca0a65
          Size/MD5 checksum:  1182350 bc265faf7e76574c8256e33d17b6faeb
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.