Date: Fri, 12 Aug 2005 00:28:26 +0200 From: "Simon L. Nielsen" <simon@FreeBSD.org> To: gnome@FreeBSD.org, asa@agava.com, Erwin Lansing <erwin@FreeBSD.org> Subject: xpdf related vulnerabilities Message-ID: <20050811222825.GA6463@zaphod.nitro.dk>
next in thread | raw e-mail | index | archive | help
--YiEDa0DAkWCtVeE4 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello gpdf, cups, and pdftohtml maintainers, As recently documented in the FreeBSD VuXML document [1] there is a security vulnerability in xpdf, which is embeded in gdf, cups, and pdftohtml. A patch is available at [2]. Please update the ports as soon as possible. Thanks in advance. [1] http://vuxml.FreeBSD.org/24eee285-09c7-11da-bc08-0001020eed82.html [2] http://cvsweb.FreeBSD.org/ports/graphics/xpdf/files/patch-security2 --=20 Simon L. Nielsen --YiEDa0DAkWCtVeE4 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (FreeBSD) iD8DBQFC+9EJh9pcDSc1mlERAgFsAKCBdcxtyYVIo1I65VCq09WPyaSFIACeNGWM 1kTpkhWAFR+pyV42q3NXvfk= =XeIs -----END PGP SIGNATURE----- --YiEDa0DAkWCtVeE4--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050811222825.GA6463>