October 29, 2009

Slackware Security Announcement 2009-302-02: 2009-10-28 poppler

[slackware-security] poppler (SSA:2009-302-02)

 

New poppler packages are available for Slackware 12.0, 12.1, 12.2, 13.0,

and -current to fix security issues.

 

More details about this issue may be found in the Common

Vulnerabilities and Exposures (CVE) database:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609

 

 

Here are the details from the Slackware 13.0 ChangeLog:

+--------------------------+

patches/packages/poppler-0.10.7-i486-2_slack13.0.txz: Rebuilt.

This updated package includes patches based on xpdf 3.02pl4.

For more information, see:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609

(* Security fix *)

+--------------------------+

 

 

Where to find the new packages:

+-----------------------------+

 

HINT: Getting slow download speeds from ftp.slackware.com?

Give slackware.osuosl.org a try. This is another primary FTP site

for Slackware that can be considerably faster than downloading

directly from ftp.slackware.com.

 

Thanks to the friendly folks at the OSU Open Source Lab

(http://osuosl.org) for donating additional FTP and rsync hosting

to the Slackware project! :-)

 

Also see the "Get Slack" section on http://slackware.com for

additional mirror sites near you.

 

Updated package for Slackware 12.0:

ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/po...

 

Updated package for Slackware 12.1:

ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/po...

 

Updated package for Slackware 12.2:

ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/po...

 

Updated package for Slackware 13.0:

ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/po...

 

Updated package for Slackware x86_64 13.0:

ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/...

 

Updated packages for Slackware -current:

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/popp...

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/popp...

 

Updated packages for Slackware x86_64 -current:

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/...

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/...

 

 

MD5 signatures:

+-------------+

 

Slackware 12.0 package:

b084a88ec1c9e5f1402fccb897040576 poppler-0.6.2-i486-2_slack12.0.tgz

 

Slackware 12.1 package:

090431253d54585f5aa4276521c4ba7e poppler-0.6.4-i486-2_slack12.1.tgz

 

Slackware 12.2 package:

f68a76fa4c24a6d2c201734a30d66008 poppler-0.8.5-i486-3_slack12.2.tgz

 

Slackware 13.0 package:

b107cf8a1b87cf068567a7523b2ed095 poppler-0.10.7-i486-2_slack13.0.txz

 

Slackware x86_64 13.0 package:

00db7f2b403b75c41e9845af9fb5acf9 poppler-0.10.7-x86_64-2_slack13.0.txz

 

Slackware -current packages:

44884e2ac09419ef8d3da49b2e754ee8 poppler-0.12.1-i486-1.txz

6eb0574ab09269d8789c4b64a56d6692 poppler-data-0.3.0-noarch-1.txz

 

Slackware x86_64 -current packages:

c90a9e6dfa090c0098ca45e5e14f0892 poppler-0.12.1-x86_64-1.txz

28ac087f83577b39cbed515e501ee447 poppler-data-0.3.0-noarch-1.txz

 

 

Installation instructions:

+------------------------+

 

Upgrade the package as root:

# upgradepkg poppler-0.10.7-i486-2_slack13.0.txz

 

 

+-----+

 

Slackware Linux Security Team

http://slackware.com/gpg-key

This e-mail address is being protected from spambots. You need JavaScript enabled to view it

Click Here!