-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  xpdf (SSA:2006-045-09)

New xpdf packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2,
and -current to fix security issues.

More details about the issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301


Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/xpdf-3.01-i486-3.tgz:  Recompiled with xpdf-3.01pl2.patch to
  fix integer and heap overflows in xpdf triggered by malformed PDF files.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/xpdf-3.01-i386-3.tgz

Updated package for Slackware 9.1:

Updated package for Slackware 10.0:

Updated package for Slackware 10.1:

Updated package for Slackware 10.2:

Updated package for Slackware -current:


MD5 signatures:
+-------------+

Slackware 9.0 package:
febda74afb06e94f745ef2d02867b505  xpdf-3.01-i386-3.tgz

Slackware 9.1 package:
1dd5847ecf094359fe712850391e7b37  xpdf-3.01-i486-3.tgz

Slackware 10.0 package:
abd65f71b8484579aa4b1ce081b4d61e  xpdf-3.01-i486-3.tgz

Slackware 10.1 package:
9270fb578380221d9e642c7d80fac931  xpdf-3.01-i486-3a.tgz

Slackware 10.2 package:
8c85579182d43d56920e5a79063b447e  xpdf-3.01-i486-3.tgz

Slackware -current package:
172d66fd19dbf8ceca0a25a6c17e75c2  xpdf-3.01-i486-3.tgz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg xpdf-3.01-i486-3.tgz


+-----+

Slackware: 2006-045-09: xpdf Security Update

February 15, 2006
New xpdf packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix security issues

Summary

Here are the details from the Slackware 10.2 ChangeLog: patches/packages/xpdf-3.01-i486-3.tgz: Recompiled with xpdf-3.01pl2.patch to fix integer and heap overflows in xpdf triggered by malformed PDF files. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301 (* Security fix *)

Where Find New Packages

Updated package for Slackware 9.0: ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/xpdf-3.01-i386-3.tgz
Updated package for Slackware 9.1:
Updated package for Slackware 10.0:
Updated package for Slackware 10.1:
Updated package for Slackware 10.2:
Updated package for Slackware -current:

MD5 Signatures

Slackware 9.0 package: febda74afb06e94f745ef2d02867b505 xpdf-3.01-i386-3.tgz
Slackware 9.1 package: 1dd5847ecf094359fe712850391e7b37 xpdf-3.01-i486-3.tgz
Slackware 10.0 package: abd65f71b8484579aa4b1ce081b4d61e xpdf-3.01-i486-3.tgz
Slackware 10.1 package: 9270fb578380221d9e642c7d80fac931 xpdf-3.01-i486-3a.tgz
Slackware 10.2 package: 8c85579182d43d56920e5a79063b447e xpdf-3.01-i486-3.tgz
Slackware -current package: 172d66fd19dbf8ceca0a25a6c17e75c2 xpdf-3.01-i486-3.tgz

Severity
[slackware-security] xpdf (SSA:2006-045-09)
New xpdf packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix security issues.
More details about the issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg xpdf-3.01-i486-3.tgz

Related News