TITLE: Debian update for pdfkit.framework SECUNIA ADVISORY ID: SA18948 VERIFY ADVISORY: http://secunia.com/advisories/18948/ CRITICAL: Moderately critical IMPACT: Unknown WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for pdfkit.framework. This fixes some potential vulnerabilities with unknown impacts. SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3.dsc Size/MD5 checksum: 725 de9c519b3fa8840bcd17cbd9cb9b736d http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3.diff.gz Size/MD5 checksum: 6910 ca4032bfa6f3920c7ce30f10b204d414 http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8.orig.tar.gz Size/MD5 checksum: 1780533 7676643ff78a0602c10bfb97fe0bd448 Alpha architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_alpha.deb Size/MD5 checksum: 1822264 ee7b33692e20c9036d7659fd42c3c19a AMD64 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_amd64.deb Size/MD5 checksum: 1797060 a013cec8d2f979ce457804cec5279ad7 ARM architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_arm.deb Size/MD5 checksum: 1756444 68fa644e60388efa71484d5659db43c8 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_i386.deb Size/MD5 checksum: 1750746 5d9d3190e9631865b6576cc064c123fc Intel IA-64 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_ia64.deb Size/MD5 checksum: 1981562 2516d48b571ddbb587d9e9e5ce3e00da HP Precision architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_hppa.deb Size/MD5 checksum: 1862848 349dac672d42915e2a5778cbf78c62bd Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_m68k.deb Size/MD5 checksum: 1786208 6b9617a7449efce9eee6b65e0160e504 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_mips.deb Size/MD5 checksum: 1769510 f45ab741024d90bf8887217c9addfa00 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_mipsel.deb Size/MD5 checksum: 1755142 ef20414216a3fc828ac5686bd9bf28a2 PowerPC architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_powerpc.deb Size/MD5 checksum: 1771308 47dbcb9f76c750924441f8f5edc2d900 IBM S/390 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_s390.deb Size/MD5 checksum: 1805244 76ec3454cbfa1a588ede6ed4f0a7758d Sun Sparc architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3_sparc.deb Size/MD5 checksum: 1780426 695eb2cc6075f70c00d73b1ed7ecc491 ORIGINAL ADVISORY: http://www.debian.org/security/2006/dsa-979 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------