Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 12 Aug 2005 00:28:26 +0200
From:      "Simon L. Nielsen" <simon@FreeBSD.org>
To:        gnome@FreeBSD.org, asa@agava.com, Erwin Lansing <erwin@FreeBSD.org>
Subject:   xpdf related vulnerabilities
Message-ID:  <20050811222825.GA6463@zaphod.nitro.dk>

next in thread | raw e-mail | index | archive | help

--YiEDa0DAkWCtVeE4
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hello gpdf, cups, and pdftohtml maintainers,

As recently documented in the FreeBSD VuXML document [1] there is a
security vulnerability in xpdf, which is embeded in gdf, cups, and
pdftohtml.  A patch is available at [2].

Please update the ports as soon as possible.

Thanks in advance.

[1] http://vuxml.FreeBSD.org/24eee285-09c7-11da-bc08-0001020eed82.html
[2] http://cvsweb.FreeBSD.org/ports/graphics/xpdf/files/patch-security2

--=20
Simon L. Nielsen

--YiEDa0DAkWCtVeE4
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)

iD8DBQFC+9EJh9pcDSc1mlERAgFsAKCBdcxtyYVIo1I65VCq09WPyaSFIACeNGWM
1kTpkhWAFR+pyV42q3NXvfk=
=XeIs
-----END PGP SIGNATURE-----

--YiEDa0DAkWCtVeE4--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050811222825.GA6463>