TITLE: Fedora update for poppler SECUNIA ADVISORY ID: SA18839 VERIFY ADVISORY: http://secunia.com/advisories/18839/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued an update for poppler. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. For more information: SA18677 SOLUTION: Apply updated packages. Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ a6389ee0a029cd9d00554e895379b58141be1e9d SRPMS/poppler-0.4.5-1.1.src.rpm 55b7d8faeda8942de95da47256dd63324826ab0d ppc/poppler-0.4.5-1.1.ppc.rpm 4e2cf64d7b1cf1f6dcd2f4d4dec6abfe37032cbf ppc/poppler-devel-0.4.5-1.1.ppc.rpm b04be63e76106bb65bb7e9e1a99c74a8e973514d ppc/debug/poppler-debuginfo-0.4.5-1.1.ppc.rpm 249b969c8751b1a53722e8264d2f3fc8fc5e9979 x86_64/poppler-0.4.5-1.1.x86_64.rpm f5e61e706c434ad24bd6cece6affa754361d80cd x86_64/poppler-devel-0.4.5-1.1.x86_64.rpm cfb05d07796ee23f56ed3aa19111f875d54e4b7f x86_64/debug/poppler-debuginfo-0.4.5-1.1.x86_64.rpm 8dc27611a2cde6baeb0d6212a88e7ad6d8035808 i386/poppler-0.4.5-1.1.i386.rpm 73f916b518fa1e32a1ecba95cf9cc36a6e2bc49a i386/poppler-devel-0.4.5-1.1.i386.rpm 7026c75efdce668f7e35bc2332f5d516496aef1f i386/debug/poppler-debuginfo-0.4.5-1.1.i386.rpm OTHER REFERENCES: SA18677: http://secunia.com/advisories/18677/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------