what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 19091

Secunia Security Advisory 19091
Posted Mar 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xpdf. This fixes some potential vulnerabilities with unknown impacts.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | e706236fdf2350bfb8c753ac78e46da936bdbdb0a7f88fb4d1a5830b7a01cfdf

Secunia Security Advisory 19091

Change Mirror Download


TITLE:
Debian update for xpdf

SECUNIA ADVISORY ID:
SA19091

VERIFY ADVISORY:
http://secunia.com/advisories/19091/

CRITICAL:
Moderately critical

IMPACT:
Unknown

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 3.1
http://secunia.com/product/5307/

DESCRIPTION:
Debian has issued an update for xpdf. This fixes some potential
vulnerabilities with unknown impacts.

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.00-13.6.dsc
Size/MD5 checksum: 781 3b09a41551eb88e135d4c1545edc3897
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.00-13.6.diff.gz
Size/MD5 checksum: 51817 20487e64403271f8193ddc959ff46d06
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.00.orig.tar.gz
Size/MD5 checksum: 534697 95294cef3031dd68e65f331e8750b2c2

Architecture independent components:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_3.00-13.6_all.deb
Size/MD5 checksum: 56592 49fcfd17053fba4b288e0ce69660f108
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.00-13.6_all.deb
Size/MD5 checksum: 1284 91afb670cc3c9c19fb1e153c650f5fc1

Alpha architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_alpha.deb
Size/MD5 checksum: 802784 6db7693ed94beda4f4918e8a639e0165
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_alpha.deb
Size/MD5 checksum: 1528860 edaa31b0b8c87b8605f4fddbe5197826

AMD64 architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_amd64.deb
Size/MD5 checksum: 668468 6038c7858722032cef42823af1ceb27d
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_amd64.deb
Size/MD5 checksum: 1275066 cad43af52cea66d5e2e046eaf0b0c734

ARM architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_arm.deb
Size/MD5 checksum: 675102 933e77479fa35243f25b9cf0a7af9960
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_arm.deb
Size/MD5 checksum: 1279998 a2618d91a020e91f4a543526b00bab7e

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_i386.deb
Size/MD5 checksum: 657110 7da2961c7030f4753ea677d40c7e8264
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_i386.deb
Size/MD5 checksum: 1242800 1fe93e71851091093ad61e0fc9e207ef

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_ia64.deb
Size/MD5 checksum: 951326 055fe0db7d1f7111cc6370f65d45f439
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_ia64.deb
Size/MD5 checksum: 1802816 f9168deac0eda96b115bde2fbbf422e6

HP Precision architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_hppa.deb
Size/MD5 checksum: 833234 53a85c49c0d0ed760da1ac5bd256cc1c
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_hppa.deb
Size/MD5 checksum: 1581132 b830198ef741369f777e4a231c2b2352

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_m68k.deb
Size/MD5 checksum: 586338 a951da441c2a3288622b116932faa42d
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_m68k.deb
Size/MD5 checksum: 1117564 2fa1b6c62f770dbae84a02ca274fc0be

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_mips.deb
Size/MD5 checksum: 808166 590198eb28d9ed0d6b32be9d1bac320b
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_mips.deb
Size/MD5 checksum: 1525622 64de5bac988b7dc970cbf4e2ac5c991e

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_mipsel.deb
Size/MD5 checksum: 798476 f269b9c1fc2ed4b90c32f4c53b0a8c91
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_mipsel.deb
Size/MD5 checksum: 1504284 998fc34caadad1809fcb5bfe8d9dccd1

PowerPC architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_powerpc.deb
Size/MD5 checksum: 694632 bc97e0eb5dbaa07f107507d5f956f1c6
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_powerpc.deb
Size/MD5 checksum: 1313730 8851ce3bb1bc3fd71a3e6ced3080e392

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_s390.deb
Size/MD5 checksum: 631038 0ffbacdcf61d48ba58c27c3a21156520
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_s390.deb
Size/MD5 checksum: 1199354 3d551ef88027086a58bbe6e2312728fe

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.6_sparc.deb
Size/MD5 checksum: 626786 9ab324a84408a8ab36b6d334d8ca0a65
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.6_sparc.deb
Size/MD5 checksum: 1182350 bc265faf7e76574c8256e33d17b6faeb

-- Debian GNU/Linux unstable alias sid --

Fixed in version 3.01-7.

ORIGINAL ADVISORY:
http://www.debian.org/security/2006/dsa-984

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close