Home / vulnerabilitiesPDF  

MDVSA-2009-334.txt

Posted on 17 December 2009
Source : packetstormsecurity.org Link

 


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:334
http://www.mandriva.com/security/
_______________________________________________________________________

Package : poppler
Date : January 1, 1970
Affected: Corporate 4.0
_______________________________________________________________________

Problem Description:


_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
_______________________________________________________________________

Updated Packages:

Corporate 4.0:
4b885bda62ebbeb3cc1bb87b7904c725 corporate/4.0/i586/libpoppler0-0.4.1-3.10.20060mlcs4.i586.rpm
ec004634deb8a53b67ed890080d9b3b9 corporate/4.0/i586/libpoppler0-devel-0.4.1-3.10.20060mlcs4.i586.rpm
d9c880463e437e43ecf8fc53b03225e1 corporate/4.0/i586/libpoppler-qt0-0.4.1-3.10.20060mlcs4.i586.rpm
c7b14c8fb3f0101eb91685379096252a corporate/4.0/i586/libpoppler-qt0-devel-0.4.1-3.10.20060mlcs4.i586.rpm
287203505cdafc1091000c7c17b5b532 corporate/4.0/SRPMS/poppler-0.4.1-3.10.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
e8257b84ffe164e374d6134ebc87cdeb corporate/4.0/x86_64/lib64poppler0-0.4.1-3.10.20060mlcs4.x86_64.rpm
578226b19e08f1f4428a63e6b6fb9b66 corporate/4.0/x86_64/lib64poppler0-devel-0.4.1-3.10.20060mlcs4.x86_64.rpm
fc519d68b36219f454a08a87c7493cbf corporate/4.0/x86_64/lib64poppler-qt0-0.4.1-3.10.20060mlcs4.x86_64.rpm
859abd2e604a05f836bb3a3c4ad0948a corporate/4.0/x86_64/lib64poppler-qt0-devel-0.4.1-3.10.20060mlcs4.x86_64.rpm
287203505cdafc1091000c7c17b5b532 corporate/4.0/SRPMS/poppler-0.4.1-3.10.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLKVV4mqjQ0CJFipgRAmfiAJ9prVeHWMfs9wKZ6E/PBbGcY/5B+gCggihx
5dJwIGYG6/HPc817hRImN7A=
=TCNS
-----END PGP SIGNATURE-----

 

TOP

Malware :