[prev in list] [next in list] [prev in thread] [next in thread] 

List:       secunia-sec-adv
Subject:    [SA19021] Debian update for pdftohtml
From:       Secunia Security Advisories <sec-adv () secunia ! com>
Date:       2006-02-28 14:32:05
Message-ID: 20060228143205.20533.qmail () secunia ! com
[Download RAW message or body]


TITLE:
Debian update for pdftohtml

SECUNIA ADVISORY ID:
SA19021

VERIFY ADVISORY:
http://secunia.com/advisories/19021/

CRITICAL:
Moderately critical

IMPACT:
Unknown

WHERE:
From remote

OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 3.1
http://secunia.com/product/5307/

DESCRIPTION:
Debian has issued an update for pdftohtml. This fixes some potential
vulnerabilities with unknown impacts.

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2.dsc
Size/MD5 checksum: 602 8dc87f9f04bf4e95d628a81540b5320e
http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2.diff.gz
Size/MD5 checksum: 11953 aa4fe47eeec4ff81df92aab8f218f1f1
http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36.orig.tar.gz
Size/MD5 checksum: 300922 75ad095bb51e1f66c9f7691e6af12f44

Alpha architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_alpha.deb
Size/MD5 checksum: 314142 b5bd8a0387aaaa69a31b74bc9baf7498

AMD64 architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_amd64.deb
Size/MD5 checksum: 259728 a16f018455f8e3409399f9123af3c17a

ARM architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_arm.deb
Size/MD5 checksum: 266500 bbf302ca14ddad34769b0b8a5822d139

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_i386.deb
Size/MD5 checksum: 253988 fd6e84484e62b90ff4eb419bdff63044

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_ia64.deb
Size/MD5 checksum: 374206 900ea16bffd41ff59272bab4e89077a9

HP Precision architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_hppa.deb
Size/MD5 checksum: 330356 4bf2182b3dc9f1269efb039c07fceea3

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_m68k.deb
Size/MD5 checksum: 234812 34eb54fb6c07676aee15a9cc15110c28

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_mips.deb
Size/MD5 checksum: 311482 2540b6b4c0b523087a40fb4ef7b57c46

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_mipsel.deb
Size/MD5 checksum: 307188 16034038f8c3c206623702c4b3695b69

PowerPC architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_powerpc.deb
Size/MD5 checksum: 269634 4053b1c0d6c76ca5c94ee97df412b5e5

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_s390.deb
Size/MD5 checksum: 242482 ff9f29460ad1cb56b4c92dfd3e1e2d57

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_sparc.deb
Size/MD5 checksum: 245378 d1ecf4c546240dab174947827b01766e

-- Debian GNU/Linux unstable alias sid --

Fixed in version 0.36-12.

ORIGINAL ADVISORY:
http://www.debian.org/security/2006/dsa-983

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=secunia-sec-adv%40progressive-comp.com

----------------------------------------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic