---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for gpdf SECUNIA ADVISORY ID: SA21339 VERIFY ADVISORY: http://secunia.com/advisories/21339/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for gpdf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system. For more information: SA16400 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5.dsc Size/MD5 checksum: 1663 d7cd341afa44a55b1d6b6e177506df73 http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5.diff.gz Size/MD5 checksum: 37001 4c0f08229d68b89376f1dafbd2785602 http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2.orig.tar.gz Size/MD5 checksum: 1245535 5ceb66aa95e51c4e1d6e10cb29560ff9 Alpha architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_alpha.deb Size/MD5 checksum: 868192 a1165a52e231ad0d7288956259f6dac1 AMD64 architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_amd64.deb Size/MD5 checksum: 795826 b77396935f929046e71688cf6c803718 ARM architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_arm.deb Size/MD5 checksum: 781744 4bd8fcb7aa0e8d8073f9c834f492273e Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_i386.deb Size/MD5 checksum: 782022 6e3c2f14a9f79a0fa8d6c7146329cf55 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_ia64.deb Size/MD5 checksum: 958464 f60ab132197b6451be37e95c7b0802f6 HP Precision architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_hppa.deb Size/MD5 checksum: 859960 52fc5ab1c1c7b0a337093196d08076af Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_m68k.deb Size/MD5 checksum: 746044 07af12e76e683943d028347673b325dc Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_mips.deb Size/MD5 checksum: 818708 789e70f91a8b43909790389833f5c2f9 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_mipsel.deb Size/MD5 checksum: 811194 6f27ce39b1d79d49992ae66e6fc45b13 PowerPC architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_powerpc.deb Size/MD5 checksum: 799932 f7f6e5df3d35a4e24ef714a02300bb89 IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_s390.deb Size/MD5 checksum: 776202 0c511feed7677d69e5e9b901239c25e0 Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_sparc.deb Size/MD5 checksum: 763980 90c9205b4bc9b61b46d8d46c09e74b83 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.10.0-4. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1136 OTHER REFERENCES: SA16400: http://secunia.com/advisories/16400/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------