Accepted xpdf 1.00-3.4 (mipsel all source)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 14 Jan 2005 14:26:31 +0100
Source: xpdf
Binary: xpdf-common xpdf xpdf-reader xpdf-utils
Architecture: source mipsel all
Version: 1.00-3.4
Distribution: stable-security
Urgency: high
Maintainer: Hamish Moffatt <hamish@debian.org>
Changed-By: Martin Schulze <joey@infodrom.org>
Description:
xpdf - Portable Document Format (PDF) suite
xpdf-common - Portable Document Format (PDF) suite -- common files
xpdf-reader - Portable Document Format (PDF) suite -- viewer for X11
xpdf-utils - Portable Document Format (PDF) suite -- utilities
Changes:
xpdf (1.00-3.4) stable-security; urgency=high
.
* Non-maintainer upload by the Security Team
* Fixed buffer overflow that could overwrite the stack and hence cause
the execution of arbitrary code as reported by iDEFENSE
[src/Decrypt.cc, CAN-2005-0064]
Files:
635d7c4eae9655d8a3377d8eed6cb2d1 706 text optional xpdf_1.00-3.4.dsc
0267c0fd7ffecd48dd888e170953a480 10726 text optional xpdf_1.00-3.4.diff.gz
14b9041fb706c9dcf9a72a7a2d616498 1286 text optional xpdf_1.00-3.4_all.deb
d163325cae5a83d1f9ef2022242c731d 38654 text optional xpdf-common_1.00-3.4_all.deb
3651e279ad35be576904a273ccc97e82 546180 text optional xpdf-reader_1.00-3.4_mipsel.deb
d43a48dd2e29d83d6c8cd82c7b8eaede 998826 text optional xpdf-utils_1.00-3.4_mipsel.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFB6LsiW5ql+IAeqTIRAnu+AKC4QGTLPBcBARm5vfCFc60NkSzSyQCgh+7d
TEdla5fdDv65uneW9Ay/XI4=
=TOAA
-----END PGP SIGNATURE-----
Accepted:
xpdf-common_1.00-3.4_all.deb
to pool/main/x/xpdf/xpdf-common_1.00-3.4_all.deb
xpdf-reader_1.00-3.4_mipsel.deb
to pool/main/x/xpdf/xpdf-reader_1.00-3.4_mipsel.deb
xpdf-utils_1.00-3.4_mipsel.deb
to pool/main/x/xpdf/xpdf-utils_1.00-3.4_mipsel.deb
xpdf_1.00-3.4.diff.gz
to pool/main/x/xpdf/xpdf_1.00-3.4.diff.gz
xpdf_1.00-3.4.dsc
to pool/main/x/xpdf/xpdf_1.00-3.4.dsc
xpdf_1.00-3.4_all.deb
to pool/main/x/xpdf/xpdf_1.00-3.4_all.deb
Reply to: