news 28 Posted December 17, 2009 This is a multi-part message in MIME format... ------------=_1261011272-24326-2162 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2009:334 http://www.mandriva.com/security/ _______________________________________________________________________ Package : poppler Date : January 1, 1970 Affected: Corporate 4.0 _______________________________________________________________________ Problem Description: _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609 _______________________________________________________________________ Updated Packages: Corporate 4.0: 4b885bda62ebbeb3cc1bb87b7904c725 corporate/4.0/i586/libpoppler0-0.4.1-3.10.20060mlcs4.i586.rpm ec004634deb8a53b67ed890080d9b3b9 corporate/4.0/i586/libpoppler0-devel-0.4.1-3.10.20060mlcs4.i586.rpm d9c880463e437e43ecf8fc53b03225e1 corporate/4.0/i586/libpoppler-qt0-0.4.1-3.10.20060mlcs4.i586.rpm c7b14c8fb3f0101eb91685379096252a corporate/4.0/i586/libpoppler-qt0-devel-0.4.1-3.10.20060mlcs4.i586.rpm 287203505cdafc1091000c7c17b5b532 corporate/4.0/SRPMS/poppler-0.4.1-3.10.20060mlcs4.src.rpm Corporate 4.0/X86_64: e8257b84ffe164e374d6134ebc87cdeb corporate/4.0/x86_64/lib64poppler0-0.4.1-3.10.20060mlcs4.x86_64.rpm 578226b19e08f1f4428a63e6b6fb9b66 corporate/4.0/x86_64/lib64poppler0-devel-0.4.1-3.10.20060mlcs4.x86_64.rpm fc519d68b36219f454a08a87c7493cbf corporate/4.0/x86_64/lib64poppler-qt0-0.4.1-3.10.20060mlcs4.x86_64.rpm 859abd2e604a05f836bb3a3c4ad0948a corporate/4.0/x86_64/lib64poppler-qt0-devel-0.4.1-3.10.20060mlcs4.x86_64.rpm 287203505cdafc1091000c7c17b5b532 corporate/4.0/SRPMS/poppler-0.4.1-3.10.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLKVV4mqjQ0CJFipgRAmfiAJ9prVeHWMfs9wKZ6E/PBbGcY/5B+gCggihx 5dJwIGYG6/HPc817hRImN7A= =TCNS -----END PGP SIGNATURE----- ------------=_1261011272-24326-2162 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1261011272-24326-2162-- Share this post Link to post