ID RHSA-2005:671 Type redhat Reporter RedHat Modified 2017-09-08T12:17:20
Description
The kdegraphics packages contain applications for the K Desktop Environment
including kpdf, a pdf file viewer.
A flaw was discovered in kpdf. An attacker could construct a carefully
crafted PDF file that would cause kpdf to consume all available disk space
in /tmp when opened. The Common Vulnerabilities and Exposures project
assigned the name CAN-2005-2097 to this issue.
Note this issue does not affect Red Hat Enterprise Linux 3 or 2.1.
Users of kpdf should upgrade to these updated packages, which contains a
backported patch to resolve this issue.
{"id": "RHSA-2005:671", "type": "redhat", "bulletinFamily": "unix", "title": "(RHSA-2005:671) kdegraphics security update", "description": "The kdegraphics packages contain applications for the K Desktop Environment\r\nincluding kpdf, a pdf file viewer. \r\n\r\nA flaw was discovered in kpdf. An attacker could construct a carefully\r\ncrafted PDF file that would cause kpdf to consume all available disk space\r\nin /tmp when opened. The Common Vulnerabilities and Exposures project\r\nassigned the name CAN-2005-2097 to this issue.\r\n\r\nNote this issue does not affect Red Hat Enterprise Linux 3 or 2.1.\r\n\r\nUsers of kpdf should upgrade to these updated packages, which contains a\r\nbackported patch to resolve this issue.", "published": "2005-08-09T04:00:00", "modified": "2017-09-08T12:17:20", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://access.redhat.com/errata/RHSA-2005:671", "reporter": "RedHat", "references": [], "cvelist": ["CVE-2005-2097"], "lastseen": "2019-08-13T18:45:42", "viewCount": 1, "enchantments": {"score": {"value": 6.9, "vector": "NONE", "modified": "2019-08-13T18:45:42", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-2097"]}, {"type": "ubuntu", "idList": ["USN-163-1"]}, {"type": "freebsd", "idList": ["24EEE285-09C7-11DA-BC08-0001020EED82"]}, {"type": "gentoo", "idList": ["GLSA-200508-08"]}, {"type": "nessus", "idList": ["DEBIAN_DSA-1136.NASL", "REDHAT-RHSA-2005-706.NASL", "UBUNTU_USN-163-1.NASL", "MANDRAKE_MDKSA-2005-136.NASL", "CENTOS_RHSA-2005-670.NASL", "FEDORA_2005-730.NASL", "GENTOO_GLSA-200508-08.NASL", "REDHAT-RHSA-2005-670.NASL", "FREEBSD_PKG_24EEE28509C711DABC080001020EED82.NASL", "MANDRAKE_MDKSA-2005-135.NASL"]}, {"type": "osvdb", "idList": ["OSVDB:18666", "OSVDB:18693", "OSVDB:18667"]}, {"type": "openvas", "idList": ["OPENVAS:55091", "OPENVAS:55046", "OPENVAS:56146", "OPENVAS:57204"]}, {"type": "centos", "idList": ["CESA-2005:706", "CESA-2005:708", "CESA-2005:671", "CESA-2005:670"]}, {"type": "redhat", "idList": ["RHSA-2005:670", "RHSA-2005:708", "RHSA-2005:706"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:9434"]}, {"type": "debian", "idList": ["DEBIAN:DSA-780-1:31D4D", "DEBIAN:DSA-936-1:CC668", "DEBIAN:DSA-1136-1:CF3CA"]}, {"type": "oraclelinux", "idList": ["ELSA-2006-0262"]}], "modified": "2019-08-13T18:45:42", "rev": 2}, "vulnersScore": 6.9}, "affectedPackage": [{"OS": "RedHat", "OSVersion": "any", "arch": "s390", "packageName": "kdegraphics-devel", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-devel-3.3.1-3.4.s390.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "s390x", "packageName": "kdegraphics-devel", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-devel-3.3.1-3.4.s390x.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "ppc", "packageName": "kdegraphics", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-3.3.1-3.4.ppc.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "ia64", "packageName": "kdegraphics", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-3.3.1-3.4.ia64.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "s390", "packageName": "kdegraphics", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-3.3.1-3.4.s390.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "src", "packageName": "kdegraphics", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-3.3.1-3.4.src.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "s390x", "packageName": "kdegraphics", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-3.3.1-3.4.s390x.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "x86_64", "packageName": "kdegraphics-devel", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-devel-3.3.1-3.4.x86_64.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "ia64", "packageName": "kdegraphics-devel", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-devel-3.3.1-3.4.ia64.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "ppc", "packageName": "kdegraphics-devel", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-devel-3.3.1-3.4.ppc.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "i386", "packageName": "kdegraphics-devel", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-devel-3.3.1-3.4.i386.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "x86_64", "packageName": "kdegraphics", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-3.3.1-3.4.x86_64.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "any", "arch": "i386", "packageName": "kdegraphics", "packageVersion": "3.3.1-3.4", "packageFilename": "kdegraphics-3.3.1-3.4.i386.rpm", "operator": "lt"}], "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:24:37", "description": "xpdf and kpdf do not properly validate the \"loca\" table in PDF files, which allows local users to cause a denial of service (disk consumption and hang) via a PDF file with a \"broken\" loca table, which causes a large temporary file to be created when xpdf attempts to reconstruct the information.", "edition": 4, "cvss3": {}, "published": "2005-08-16T04:00:00", "title": "CVE-2005-2097", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-2097"], "modified": "2018-10-19T15:32:00", "cpe": ["cpe:/a:xpdf:xpdf:3.0_pl2", "cpe:/a:xpdf:xpdf:3.0", "cpe:/a:kde:kpdf:*", "cpe:/a:xpdf:xpdf:3.0_pl3"], "id": "CVE-2005-2097", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2097", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*"]}], "ubuntu": [{"lastseen": "2020-07-09T19:40:11", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "xpdf and kpdf did not sufficiently verify the validity of the \"loca\" \ntable in PDF files, a table that contains glyph description \ninformation for embedded TrueType fonts. After detecting the broken \ntable, xpdf attempted to reconstruct the information in it, which \ncaused the generation of a huge temporary file that quickly filled up \navailable disk space and rendered the application unresponsive.\n\nThe CUPS printing system in Ubuntu 5.04 uses the xpdf-utils package to \nconvert PDF files to PostScript. By attempting to print such a crafted \nPDF file, a remote attacker could cause a Denial of Service in a print \nserver. The CUPS system in Ubuntu 4.10 is not vulnerable against this \nattack.", "edition": 5, "modified": "2005-08-10T00:00:00", "published": "2005-08-10T00:00:00", "id": "USN-163-1", "href": "https://ubuntu.com/security/notices/USN-163-1", "title": "xpdf vulnerability", "type": "ubuntu", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:44", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "edition": 1, "description": "### Background\n\nXpdf, Kpdf and GPdf are PDF file viewers that run under the X Window System. Kpdf and GPdf both contain Xpdf code. Kpdf is also part of kdegraphics. \n\n### Description\n\nXpdf, Kpdf and GPdf do not handle a broken table of embedded TrueType fonts correctly. After detecting such a table, Xpdf, Kpdf and GPdf attempt to reconstruct the information in it by decoding the PDF file, which causes the generation of a huge temporary file. \n\n### Impact\n\nA remote attacker may cause a Denial of Service by creating a specially crafted PDF file, sending it to a CUPS printing system (which uses Xpdf), or by enticing a user to open it in Xpdf, Kpdf, or GPdf. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Xpdf users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-text/xpdf-3.00-r10\"\n\nAll GPdf users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-text/gpdf-2.10.0-r1\"\n\nAll Kpdf users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=kde-base/kdegraphics-3.3.2-r3\"\n\nAll KDE Split Ebuild Kpdf users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=kde-base/kpdf-3.4.1-r1\"", "modified": "2005-08-16T00:00:00", "published": "2005-08-16T00:00:00", "id": "GLSA-200508-08", "href": "https://security.gentoo.org/glsa/200508-08", "type": "gentoo", "title": "Xpdf, Kpdf, GPdf: Denial of Service vulnerability", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:15", "bulletinFamily": "software", "cvelist": ["CVE-2005-2097"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-936)\nSecurity Tracker: 1014645\n[Secunia Advisory ID:16404](https://secuniaresearch.flexerasoftware.com/advisories/16404/)\n[Secunia Advisory ID:16437](https://secuniaresearch.flexerasoftware.com/advisories/16437/)\n[Secunia Advisory ID:16676](https://secuniaresearch.flexerasoftware.com/advisories/16676/)\n[Secunia Advisory ID:16374](https://secuniaresearch.flexerasoftware.com/advisories/16374/)\n[Secunia Advisory ID:16390](https://secuniaresearch.flexerasoftware.com/advisories/16390/)\n[Secunia Advisory ID:16385](https://secuniaresearch.flexerasoftware.com/advisories/16385/)\n[Secunia Advisory ID:16440](https://secuniaresearch.flexerasoftware.com/advisories/16440/)\n[Secunia Advisory ID:16482](https://secuniaresearch.flexerasoftware.com/advisories/16482/)\n[Secunia Advisory ID:18407](https://secuniaresearch.flexerasoftware.com/advisories/18407/)\n[Secunia Advisory ID:16391](https://secuniaresearch.flexerasoftware.com/advisories/16391/)\n[Secunia Advisory ID:16380](https://secuniaresearch.flexerasoftware.com/advisories/16380/)\n[Secunia Advisory ID:16415](https://secuniaresearch.flexerasoftware.com/advisories/16415/)\n[Secunia Advisory ID:16452](https://secuniaresearch.flexerasoftware.com/advisories/16452/)\n[Secunia Advisory ID:25729](https://secuniaresearch.flexerasoftware.com/advisories/25729/)\n[Secunia Advisory ID:16383](https://secuniaresearch.flexerasoftware.com/advisories/16383/)\n[Secunia Advisory ID:16417](https://secuniaresearch.flexerasoftware.com/advisories/16417/)\n[Secunia Advisory ID:16535](https://secuniaresearch.flexerasoftware.com/advisories/16535/)\n[Secunia Advisory ID:17277](https://secuniaresearch.flexerasoftware.com/advisories/17277/)\nRedHat RHSA: RHSA-2005:708\nRedHat RHSA: RHSA-2005:670\nRedHat RHSA: RHSA-2005:706\nOther Advisory URL: http://www.ubuntulinux.org/support/documentation/usn/usn-163-1\nOther Advisory URL: ftp://patches.sgi.com/support/free/security/advisories/20050802-01-U.asc\nOther Advisory URL: http://www.trustix.org/errata/2005/0043/\nOther Advisory URL: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1\nOther Advisory URL: http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:138\nOther Advisory URL: http://security.gentoo.org/glsa/glsa-200508-08.xml\nOther Advisory URL: http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:134\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_19_sr.html\n[CVE-2005-2097](https://vulners.com/cve/CVE-2005-2097)\n", "modified": "2005-08-09T05:06:26", "published": "2005-08-09T05:06:26", "href": "https://vulners.com/osvdb/OSVDB:18666", "id": "OSVDB:18666", "type": "osvdb", "title": "Xpdf Temporary File Disk Space Consumption DoS", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:15", "bulletinFamily": "software", "cvelist": ["CVE-2005-2097"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-936)\n[Vendor Specific Advisory URL](http://rhn.redhat.com/errata/RHSA-2005-708.html)\n[Secunia Advisory ID:16437](https://secuniaresearch.flexerasoftware.com/advisories/16437/)\n[Secunia Advisory ID:16676](https://secuniaresearch.flexerasoftware.com/advisories/16676/)\n[Secunia Advisory ID:16400](https://secuniaresearch.flexerasoftware.com/advisories/16400/)\n[Secunia Advisory ID:16440](https://secuniaresearch.flexerasoftware.com/advisories/16440/)\n[Secunia Advisory ID:16482](https://secuniaresearch.flexerasoftware.com/advisories/16482/)\n[Secunia Advisory ID:18407](https://secuniaresearch.flexerasoftware.com/advisories/18407/)\n[Secunia Advisory ID:21339](https://secuniaresearch.flexerasoftware.com/advisories/21339/)\n[Secunia Advisory ID:25729](https://secuniaresearch.flexerasoftware.com/advisories/25729/)\n[Secunia Advisory ID:16535](https://secuniaresearch.flexerasoftware.com/advisories/16535/)\nOther Advisory URL: ftp://patches.sgi.com/support/free/security/advisories/20050802-01-U.asc\nOther Advisory URL: http://www.trustix.org/errata/2005/0043/\nOther Advisory URL: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1\nOther Advisory URL: http://security.gentoo.org/glsa/glsa-200508-08.xml\nOther Advisory URL: http://www.us.debian.org/security/2006/dsa-1136\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_19_sr.html\n[CVE-2005-2097](https://vulners.com/cve/CVE-2005-2097)\n", "modified": "2005-08-10T05:14:23", "published": "2005-08-10T05:14:23", "href": "https://vulners.com/osvdb/OSVDB:18693", "id": "OSVDB:18693", "type": "osvdb", "title": "GNOME gpdf Temporary File Disk Space Consumption DoS", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:15", "bulletinFamily": "software", "cvelist": ["CVE-2005-2097"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-936)\n[Vendor Specific Advisory URL](http://www.kde.org/info/security/advisory-20050809-1.txt)\nSecurity Tracker: 1014637\n[Secunia Advisory ID:16404](https://secuniaresearch.flexerasoftware.com/advisories/16404/)\n[Secunia Advisory ID:16437](https://secuniaresearch.flexerasoftware.com/advisories/16437/)\n[Secunia Advisory ID:16676](https://secuniaresearch.flexerasoftware.com/advisories/16676/)\n[Secunia Advisory ID:16440](https://secuniaresearch.flexerasoftware.com/advisories/16440/)\n[Secunia Advisory ID:16482](https://secuniaresearch.flexerasoftware.com/advisories/16482/)\n[Secunia Advisory ID:16537](https://secuniaresearch.flexerasoftware.com/advisories/16537/)\n[Secunia Advisory ID:18407](https://secuniaresearch.flexerasoftware.com/advisories/18407/)\n[Secunia Advisory ID:16294](https://secuniaresearch.flexerasoftware.com/advisories/16294/)\n[Secunia Advisory ID:16415](https://secuniaresearch.flexerasoftware.com/advisories/16415/)\n[Secunia Advisory ID:25729](https://secuniaresearch.flexerasoftware.com/advisories/25729/)\n[Secunia Advisory ID:16417](https://secuniaresearch.flexerasoftware.com/advisories/16417/)\n[Secunia Advisory ID:16535](https://secuniaresearch.flexerasoftware.com/advisories/16535/)\nRedHat RHSA: RHSA-2005:708\nOther Advisory URL: ftp://patches.sgi.com/support/free/security/advisories/20050802-01-U.asc\nOther Advisory URL: http://www.trustix.org/errata/2005/0043/\nOther Advisory URL: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1\nOther Advisory URL: http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:138\nOther Advisory URL: http://security.gentoo.org/glsa/glsa-200508-08.xml\nOther Advisory URL: http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:134\nOther Advisory URL: http://www.debian.org/security/2005/dsa-780\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_19_sr.html\n[CVE-2005-2097](https://vulners.com/cve/CVE-2005-2097)\n", "modified": "2005-08-09T05:06:26", "published": "2005-08-09T05:06:26", "href": "https://vulners.com/osvdb/OSVDB:18667", "id": "OSVDB:18667", "type": "osvdb", "title": "KDE kpdf Temporary File Disk Space Consumption DoS", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "openvas": [{"lastseen": "2017-07-24T12:50:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200508-08.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:55091", "href": "http://plugins.openvas.org/nasl.php?oid=55091", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200508-08 (xpdf kpdf gpdf)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Xpdf, Kpdf and GPdf may crash as a result of a Denial of Service\nvulnerability.\";\ntag_solution = \"All Xpdf users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-text/xpdf-3.00-r10'\n\nAll GPdf users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-text/gpdf-2.10.0-r1'\n\nAll Kpdf users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=kde-base/kdegraphics-3.3.2-r3'\n\nAll KDE Split Ebuild Kpdf users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=kde-base/kpdf-3.4.1-r1'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200508-08\nhttp://bugs.gentoo.org/show_bug.cgi?id=99769\nhttp://bugs.gentoo.org/show_bug.cgi?id=100263\nhttp://bugs.gentoo.org/show_bug.cgi?id=100265\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200508-08.\";\n\n \n\nif(description)\n{\n script_id(55091);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_bugtraq_id(14529);\n script_cve_id(\"CVE-2005-2097\");\n script_tag(name:\"cvss_base\", value:\"2.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200508-08 (xpdf kpdf gpdf)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"app-text/xpdf\", unaffected: make_list(\"ge 3.00-r10\"), vulnerable: make_list(\"lt 3.00-r10\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"kde-base/kdegraphics\", unaffected: make_list(\"ge 3.3.2-r3\"), vulnerable: make_list(\"lt 3.3.2-r3\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"kde-base/kpdf\", unaffected: make_list(\"ge 3.4.1-r1\"), vulnerable: make_list(\"lt 3.4.1-r1\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"app-text/gpdf\", unaffected: make_list(\"ge 2.10.0-r1\"), vulnerable: make_list(\"lt 2.10.0-r1\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:49:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "description": "The remote host is missing an update to gpdf\nannounced via advisory DSA 1136-1.\n\ninfamous41md and Chris Evans discovered several heap based buffer\noverflows in xpdf, the Portable Document Format (PDF) suite, which are\nalso present in gpdf, the viewer with Gtk bindings, and which can lead\nto a denial of service by crashing the application or possibly to the\nexecution of arbitrary code.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57204", "href": "http://plugins.openvas.org/nasl.php?oid=57204", "type": "openvas", "title": "Debian Security Advisory DSA 1136-1 (gpdf)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1136_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1136-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 2.8.2-1.2sarge5.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.10.0-4.\n\nWe recommend that you upgrade your gpdf package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201136-1\";\ntag_summary = \"The remote host is missing an update to gpdf\nannounced via advisory DSA 1136-1.\n\ninfamous41md and Chris Evans discovered several heap based buffer\noverflows in xpdf, the Portable Document Format (PDF) suite, which are\nalso present in gpdf, the viewer with Gtk bindings, and which can lead\nto a denial of service by crashing the application or possibly to the\nexecution of arbitrary code.\";\n\n\nif(description)\n{\n script_id(57204);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2005-2097\");\n script_bugtraq_id(14529);\n script_tag(name:\"cvss_base\", value:\"2.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Debian Security Advisory DSA 1136-1 (gpdf)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"gpdf\", ver:\"2.8.2-1.2sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-02T21:10:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-10-05T00:00:00", "published": "2008-09-04T00:00:00", "id": "OPENVAS:55046", "href": "http://plugins.openvas.org/nasl.php?oid=55046", "type": "openvas", "title": "FreeBSD Ports: xpdf", "sourceData": "#\n#VID 24eee285-09c7-11da-bc08-0001020eed82\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n xpdf\n kdegraphics\n gpdf\n cups-base\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://rhn.redhat.com/errata/RHSA-2005-670.html\nhttp://www.kde.org/info/security/advisory-20050809-1.txt\nhttp://www.vuxml.org/freebsd/24eee285-09c7-11da-bc08-0001020eed82.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(55046);\n script_version(\"$Revision: 4218 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-10-05 16:20:48 +0200 (Wed, 05 Oct 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2005-2097\");\n script_bugtraq_id(14529);\n script_tag(name:\"cvss_base\", value:\"2.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"FreeBSD Ports: xpdf\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"xpdf\");\nif(!isnull(bver) && revcomp(a:bver, b:\"3.00_7\")<0) {\n txt += 'Package xpdf version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"kdegraphics\");\nif(!isnull(bver) && revcomp(a:bver, b:\"3.4.2\")<0) {\n txt += 'Package kdegraphics version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"gpdf\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package gpdf version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"cups-base\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package cups-base version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:49:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3627", "CVE-2005-3192", "CVE-2005-2097", "CVE-2005-3626", "CVE-2005-3191", "CVE-2005-3625", "CVE-2005-3193", "CVE-2005-3624", "CVE-2005-3628"], "description": "The remote host is missing an update to libextractor\nannounced via advisory DSA 936-1.\n\ninfamous41md and Chris Evans discovered several heap based buffer\noverflows in xpdf, the Portable Document Format (PDF) suite, which is\nalso present in libextractor, a library to extract arbitrary meta-data\nfrom files, and which can lead to a denial of service by crashing the\napplication or possibly to the execution of arbitrary code.\n\nThe old stable distribution (woody) does not contain libextractor\npackages.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:56146", "href": "http://plugins.openvas.org/nasl.php?oid=56146", "type": "openvas", "title": "Debian Security Advisory DSA 936-1 (libextractor)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_936_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 936-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 0.4.2-2sarge2.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 0.5.8-1.\n\nWe recommend that you upgrade your libextractor packages.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20936-1\";\ntag_summary = \"The remote host is missing an update to libextractor\nannounced via advisory DSA 936-1.\n\ninfamous41md and Chris Evans discovered several heap based buffer\noverflows in xpdf, the Portable Document Format (PDF) suite, which is\nalso present in libextractor, a library to extract arbitrary meta-data\nfrom files, and which can lead to a denial of service by crashing the\napplication or possibly to the execution of arbitrary code.\n\nThe old stable distribution (woody) does not contain libextractor\npackages.\";\n\n\nif(description)\n{\n script_id(56146);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2005-3191\", \"CVE-2005-3192\", \"CVE-2005-3193\", \"CVE-2005-2097\", \"CVE-2005-3624\", \"CVE-2005-3625\", \"CVE-2005-3626\", \"CVE-2005-3627\", \"CVE-2005-3628\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 936-1 (libextractor)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"extract\", ver:\"0.4.2-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libextractor1\", ver:\"0.4.2-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libextractor1-dev\", ver:\"0.4.2-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "centos": [{"lastseen": "2019-12-20T18:24:18", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "**CentOS Errata and Security Advisory** CESA-2005:708\n\n\nThe gpdf package is an GNOME based viewer for Portable Document Format\r\n(PDF) files.\r\n\r\nMarcus Meissner reported a flaw in gpdf. An attacker could construct a\r\ncarefully crafted PDF file that would cause gpdf to consume all available\r\ndisk space in /tmp when opened. The Common Vulnerabilities and Exposures\r\nproject assigned the name CAN-2005-2097 to this issue.\r\n\r\nNote that this issue does not affect the version of gpdf in Red Hat\r\nEnterprise Linux 3 or 2.1.\r\n\r\nUsers of gpdf should upgrade to this updated package, which contains a\r\nbackported patch to resolve this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024093.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024094.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024097.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024098.html\n\n**Affected packages:**\ngpdf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2005-708.html", "edition": 4, "modified": "2005-08-10T21:01:13", "published": "2005-08-10T19:14:14", "href": "http://lists.centos.org/pipermail/centos-announce/2005-August/024093.html", "id": "CESA-2005:708", "title": "gpdf security update", "type": "centos", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-07-17T03:30:32", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "**CentOS Errata and Security Advisory** CESA-2005:670\n\n\nThe xpdf package is an X Window System-based viewer for Portable Document\r\nFormat (PDF) files.\r\n\r\nA flaw was discovered in Xpdf in that an attacker could construct a\r\ncarefully crafted PDF file that would cause Xpdf to consume all available\r\ndisk space in /tmp when opened. The Common Vulnerabilities and Exposures\r\nproject assigned the name CAN-2005-2097 to this issue.\r\n\r\nNote this issue does not affect the version of Xpdf in Red Hat Enterprise\r\nLinux 3 or 2.1.\r\n\r\nUsers of xpdf should upgrade to this updated package, which contains a\r\nbackported patch to resolve this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024057.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024063.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024081.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024082.html\n\n**Affected packages:**\nxpdf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2005-670.html", "edition": 6, "modified": "2005-08-10T09:21:18", "published": "2005-08-09T18:41:04", "href": "http://lists.centos.org/pipermail/centos-announce/2005-August/024057.html", "id": "CESA-2005:670", "title": "xpdf security update", "type": "centos", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-08T03:33:11", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "**CentOS Errata and Security Advisory** CESA-2005:706\n\n\nThe Common UNIX Printing System (CUPS) provides a portable printing layer for\r\nUNIX(R) operating systems.\r\n\r\nWhen processing a PDF file, bounds checking was not correctly performed on\r\nsome fields. This could cause the pdftops filter (running as user \"lp\") to\r\ncrash. The Common Vulnerabilities and Exposures project has assigned the\r\nname CAN-2005-2097 to this issue.\r\n\r\nAll users of CUPS should upgrade to these erratum packages, which contain a\r\npatch to correct this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024054.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024055.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024059.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024060.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024075.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024076.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024077.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024078.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/036394.html\n\n**Affected packages:**\ncups\ncups-devel\ncups-libs\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2005-706.html", "edition": 5, "modified": "2005-08-10T09:10:05", "published": "2005-08-09T17:51:43", "href": "http://lists.centos.org/pipermail/centos-announce/2005-August/024054.html", "id": "CESA-2005:706", "title": "cups security update", "type": "centos", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-08T03:36:56", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "**CentOS Errata and Security Advisory** CESA-2005:671\n\n\nThe kdegraphics packages contain applications for the K Desktop Environment\r\nincluding kpdf, a pdf file viewer. \r\n\r\nA flaw was discovered in kpdf. An attacker could construct a carefully\r\ncrafted PDF file that would cause kpdf to consume all available disk space\r\nin /tmp when opened. The Common Vulnerabilities and Exposures project\r\nassigned the name CAN-2005-2097 to this issue.\r\n\r\nNote this issue does not affect Red Hat Enterprise Linux 3 or 2.1.\r\n\r\nUsers of kpdf should upgrade to these updated packages, which contains a\r\nbackported patch to resolve this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024056.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024079.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024080.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/036400.html\n\n**Affected packages:**\nkdegraphics\nkdegraphics-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2005-671.html", "edition": 5, "modified": "2005-08-10T09:18:14", "published": "2005-08-09T18:39:52", "href": "http://lists.centos.org/pipermail/centos-announce/2005-August/024056.html", "id": "CESA-2005:671", "title": "kdegraphics security update", "type": "centos", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:47:01", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "The Common UNIX Printing System (CUPS) provides a portable printing layer for\r\nUNIX(R) operating systems.\r\n\r\nWhen processing a PDF file, bounds checking was not correctly performed on\r\nsome fields. This could cause the pdftops filter (running as user \"lp\") to\r\ncrash. The Common Vulnerabilities and Exposures project has assigned the\r\nname CAN-2005-2097 to this issue.\r\n\r\nAll users of CUPS should upgrade to these erratum packages, which contain a\r\npatch to correct this issue.", "modified": "2017-09-08T12:16:02", "published": "2005-08-09T04:00:00", "id": "RHSA-2005:706", "href": "https://access.redhat.com/errata/RHSA-2005:706", "type": "redhat", "title": "(RHSA-2005:706) cups security update", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-13T18:45:29", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "The gpdf package is an GNOME based viewer for Portable Document Format\r\n(PDF) files.\r\n\r\nMarcus Meissner reported a flaw in gpdf. An attacker could construct a\r\ncarefully crafted PDF file that would cause gpdf to consume all available\r\ndisk space in /tmp when opened. The Common Vulnerabilities and Exposures\r\nproject assigned the name CAN-2005-2097 to this issue.\r\n\r\nNote that this issue does not affect the version of gpdf in Red Hat\r\nEnterprise Linux 3 or 2.1.\r\n\r\nUsers of gpdf should upgrade to this updated package, which contains a\r\nbackported patch to resolve this issue.", "modified": "2017-09-08T12:09:55", "published": "2005-08-10T04:00:00", "id": "RHSA-2005:708", "href": "https://access.redhat.com/errata/RHSA-2005:708", "type": "redhat", "title": "(RHSA-2005:708) gpdf security update", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-13T18:47:15", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "The xpdf package is an X Window System-based viewer for Portable Document\r\nFormat (PDF) files.\r\n\r\nA flaw was discovered in Xpdf in that an attacker could construct a\r\ncarefully crafted PDF file that would cause Xpdf to consume all available\r\ndisk space in /tmp when opened. The Common Vulnerabilities and Exposures\r\nproject assigned the name CAN-2005-2097 to this issue.\r\n\r\nNote this issue does not affect the version of Xpdf in Red Hat Enterprise\r\nLinux 3 or 2.1.\r\n\r\nUsers of xpdf should upgrade to this updated package, which contains a\r\nbackported patch to resolve this issue.", "modified": "2017-09-08T12:10:28", "published": "2005-08-09T04:00:00", "id": "RHSA-2005:670", "href": "https://access.redhat.com/errata/RHSA-2005:670", "type": "redhat", "title": "(RHSA-2005:670) xpdf security update", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2017-10-29T13:41:39", "edition": 2, "description": "A vulnerability in the kpdf KDE PDF viewer was discovered. An attacker could construct a malicious PDF file that would cause kpdf to consume all available disk space in /tmp when opened.\n\nThe updated packages have been patched to correct this problem.", "published": "2006-01-15T00:00:00", "type": "nessus", "title": "MDKSA-2005:135 : kdegraphics", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "cpe": ["cpe:/o:mandriva:linux"], "modified": "2012-09-07T00:00:00", "id": "MANDRAKE_MDKSA-2005-135.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=20422", "sourceData": "# @DEPRECATED@\n#\n# This script has been deprecated as the associated update is not\n# for a supported release of Mandrake / Mandriva Linux.\n#\n# Disabled on 2012/09/06.\n#\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# This script was automatically generated from\n# Mandrake Linux Security Advisory MDKSA-2005:135.\n#\n\nif (!defined_func(\"bn_random\")) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20422);\n script_version (\"$Revision: 1.9 $\"); \n script_cvs_date(\"$Date: 2012/09/07 00:48:07 $\");\n\n script_cve_id(\"CVE-2005-2097\");\n\n script_name(english:\"MDKSA-2005:135 : kdegraphics\");\n script_summary(english:\"Checks for patch(es) in 'rpm -qa' output\");\n\n script_set_attribute(attribute:\"synopsis\", value: \n\"The remote Mandrake host is missing one or more security-related\npatches.\");\n script_set_attribute(attribute:\"description\", value:\n\"A vulnerability in the kpdf KDE PDF viewer was discovered. An\nattacker could construct a malicious PDF file that would cause kpdf\nto consume all available disk space in /tmp when opened.\n\nThe updated packages have been patched to correct this problem.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:135\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package(s).\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/11\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2006/01/15\");\n script_end_attributes();\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Mandriva Local Security Checks\");\n \n script_copyright(english:\"This script is Copyright (C) 2006-2011 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n# Deprecated.\nexit(0, \"The associated update is not currently for a supported release of Mandrake / Mandriva Linux.\");\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/Mandrake/release\")) exit(0, \"The host is not running Mandrake Linux.\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) exit(1, \"Could not get the list of packages.\");\n\nflag = 0;\n\nif (rpm_check(reference:\"kdegraphics-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-common-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kdvi-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kfax-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kghostview-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kiconedit-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kolourpaint-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kooka-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kpaint-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kpdf-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kpovmodeler-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kruler-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-ksnapshot-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-ksvg-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kuickshow-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-kview-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kdegraphics-mrmlsearch-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-common-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-common-devel-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-kghostview-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-kghostview-devel-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-kooka-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-kooka-devel-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-kpovmodeler-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-kpovmodeler-devel-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-ksvg-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-ksvg-devel-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-kuickshow-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-kview-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-kview-devel-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"libkdegraphics0-mrmlsearch-3.3.2-21.2.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse \n{\n if (rpm_exists(rpm:\"kdegraphics-\", release:\"MDK10.2\"))\n {\n set_kb_item(name:\"CVE-2005-2097\", value:TRUE);\n }\n\n exit(0, \"The host is not affected.\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-10-29T13:46:02", "description": "A vulnerability in the gpdf PDF viewer was discovered. An attacker could construct a malicious PDF file that would cause gpdf to consume all available disk space in /tmp when opened.\n\nThe updated packages have been patched to correct this problem.", "edition": 2, "published": "2006-01-15T00:00:00", "type": "nessus", "title": "MDKSA-2005:136 : gpdf", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "cpe": ["cpe:/o:mandriva:linux"], "modified": "2012-09-07T00:00:00", "id": "MANDRAKE_MDKSA-2005-136.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=20423", "sourceData": "# @DEPRECATED@\n#\n# This script has been deprecated as the associated update is not\n# for a supported release of Mandrake / Mandriva Linux.\n#\n# Disabled on 2012/09/06.\n#\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# This script was automatically generated from\n# Mandrake Linux Security Advisory MDKSA-2005:136.\n#\n\nif (!defined_func(\"bn_random\")) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20423);\n script_version (\"$Revision: 1.9 $\"); \n script_cvs_date(\"$Date: 2012/09/07 00:48:07 $\");\n\n script_cve_id(\"CVE-2005-2097\");\n\n script_name(english:\"MDKSA-2005:136 : gpdf\");\n script_summary(english:\"Checks for patch(es) in 'rpm -qa' output\");\n\n script_set_attribute(attribute:\"synopsis\", value: \n\"The remote Mandrake host is missing one or more security-related\npatches.\");\n script_set_attribute(attribute:\"description\", value:\n\"A vulnerability in the gpdf PDF viewer was discovered. An attacker\ncould construct a malicious PDF file that would cause gpdf to consume\nall available disk space in /tmp when opened.\n\nThe updated packages have been patched to correct this problem.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:136\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package(s).\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/11\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2006/01/15\");\n script_end_attributes();\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Mandriva Local Security Checks\");\n \n script_copyright(english:\"This script is Copyright (C) 2006-2011 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n# Deprecated.\nexit(0, \"The associated update is not currently for a supported release of Mandrake / Mandriva Linux.\");\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/Mandrake/release\")) exit(0, \"The host is not running Mandrake Linux.\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) exit(1, \"Could not get the list of packages.\");\n\nflag = 0;\n\nif (rpm_check(reference:\"gpdf-2.8.3-3.1.102mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse \n{\n if (rpm_exists(rpm:\"gpdf-\", release:\"MDK10.2\"))\n {\n set_kb_item(name:\"CVE-2005-2097\", value:TRUE);\n }\n\n exit(0, \"The host is not affected.\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2021-01-12T10:05:52", "description": "A flaw was discovered in Xpdf in that an attacker could construct a\ncarefully crafted PDF file that would cause Xpdf to consume all\navailable disk space in /tmp when opened. The Common Vulnerabilities\nand Exposures project assigned the name CVE-2005-2097 to this issue.\n\nUsers of xpdf should upgrade to this updated package, which contains a\nbackported patch to resolve this issue.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2005-08-18T00:00:00", "title": "Fedora Core 3 : xpdf-3.00-10.6.FC3 (2005-730)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "modified": "2005-08-18T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora_core:3", "p-cpe:/a:fedoraproject:fedora:xpdf", "p-cpe:/a:fedoraproject:fedora:xpdf-debuginfo"], "id": "FEDORA_2005-730.NASL", "href": "https://www.tenable.com/plugins/nessus/19435", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2005-730.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(19435);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2005-2097\");\n script_xref(name:\"FEDORA\", value:\"2005-730\");\n\n script_name(english:\"Fedora Core 3 : xpdf-3.00-10.6.FC3 (2005-730)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was discovered in Xpdf in that an attacker could construct a\ncarefully crafted PDF file that would cause Xpdf to consume all\navailable disk space in /tmp when opened. The Common Vulnerabilities\nand Exposures project assigned the name CVE-2005-2097 to this issue.\n\nUsers of xpdf should upgrade to this updated package, which contains a\nbackported patch to resolve this issue.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2005-August/001243.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0d6adcb9\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xpdf and / or xpdf-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xpdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xpdf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/08/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 3.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC3\", reference:\"xpdf-3.00-10.6.FC3\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"xpdf-debuginfo-3.00-10.6.FC3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xpdf / xpdf-debuginfo\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:05:52", "description": "These updated packages fix a problem handling PDF files that could\nhave security implications (CVE-2005-2097).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 22, "published": "2005-08-19T00:00:00", "title": "Fedora Core 3 : cups-1.1.22-0.rc1.8.6 (2005-733)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "modified": "2005-08-19T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:cups-debuginfo", "cpe:/o:fedoraproject:fedora_core:3", "p-cpe:/a:fedoraproject:fedora:cups", "p-cpe:/a:fedoraproject:fedora:cups-libs", "p-cpe:/a:fedoraproject:fedora:cups-devel"], "id": "FEDORA_2005-733.NASL", "href": "https://www.tenable.com/plugins/nessus/19468", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2005-733.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(19468);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_xref(name:\"FEDORA\", value:\"2005-733\");\n\n script_name(english:\"Fedora Core 3 : cups-1.1.22-0.rc1.8.6 (2005-733)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"These updated packages fix a problem handling PDF files that could\nhave security implications (CVE-2005-2097).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2005-August/001261.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b368040a\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:cups\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:cups-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:cups-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:cups-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/08/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 3.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC3\", reference:\"cups-1.1.22-0.rc1.8.6\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"cups-debuginfo-1.1.22-0.rc1.8.6\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"cups-devel-1.1.22-0.rc1.8.6\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"cups-libs-1.1.22-0.rc1.8.6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cups / cups-debuginfo / cups-devel / cups-libs\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-06T10:03:27", "description": "A bug has been discovered in the font handling code in xpdf, which is\nalso present in kpdf, the PDF viewer for KDE. A specially crafted PDF\nfile could cause infinite resource consumption, in terms of both CPU\nand disk space.\n\nThe oldstable distribution (woody) is not affected by this problem.", "edition": 25, "published": "2005-08-23T00:00:00", "title": "Debian DSA-780-1 : kdegraphics - wrong input sanitising", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "modified": "2005-08-23T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:3.1", "p-cpe:/a:debian:debian_linux:kdegraphics"], "id": "DEBIAN_DSA-780.NASL", "href": "https://www.tenable.com/plugins/nessus/19477", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-780. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(19477);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2005-2097\");\n script_xref(name:\"DSA\", value:\"780\");\n\n script_name(english:\"Debian DSA-780-1 : kdegraphics - wrong input sanitising\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A bug has been discovered in the font handling code in xpdf, which is\nalso present in kpdf, the PDF viewer for KDE. A specially crafted PDF\nfile could cause infinite resource consumption, in terms of both CPU\nand disk space.\n\nThe oldstable distribution (woody) is not affected by this problem.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-780\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kpdf package.\n\nFor the stable distribution (sarge) this problem has been fixed in\nversion 3.3.2-2sarge1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kdegraphics\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/08/23\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/08/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"kamera\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kcoloredit\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kdegraphics\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kdegraphics-dev\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kdegraphics-kfile-plugins\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kdvi\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kfax\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kgamma\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kghostview\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kiconedit\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kmrml\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kolourpaint\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kooka\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kpdf\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kpovmodeler\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kruler\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ksnapshot\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ksvg\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kuickshow\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kview\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kviewshell\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkscan-dev\", reference:\"3.3.2-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkscan1\", reference:\"3.3.2-2sarge1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:deb_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-06T09:24:52", "description": "Updated kdegraphics packages that resolve a security issue in kpdf are\nnow available.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe kdegraphics packages contain applications for the K Desktop\nEnvironment including kpdf, a pdf file viewer.\n\nA flaw was discovered in kpdf. An attacker could construct a carefully\ncrafted PDF file that would cause kpdf to consume all available disk\nspace in /tmp when opened. The Common Vulnerabilities and Exposures\nproject assigned the name CVE-2005-2097 to this issue.\n\nNote this issue does not affect Red Hat Enterprise Linux 3 or 2.1.\n\nUsers of kpdf should upgrade to these updated packages, which contains\na backported patch to resolve this issue.", "edition": 25, "published": "2006-07-05T00:00:00", "title": "CentOS 4 : kdegraphics (CESA-2005:671)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "modified": "2006-07-05T00:00:00", "cpe": ["cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:kdegraphics-devel", "p-cpe:/a:centos:centos:kdegraphics"], "id": "CENTOS_RHSA-2005-671.NASL", "href": "https://www.tenable.com/plugins/nessus/21956", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:671 and \n# CentOS Errata and Security Advisory 2005:671 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21956);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2005-2097\");\n script_xref(name:\"RHSA\", value:\"2005:671\");\n\n script_name(english:\"CentOS 4 : kdegraphics (CESA-2005:671)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kdegraphics packages that resolve a security issue in kpdf are\nnow available.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe kdegraphics packages contain applications for the K Desktop\nEnvironment including kpdf, a pdf file viewer.\n\nA flaw was discovered in kpdf. An attacker could construct a carefully\ncrafted PDF file that would cause kpdf to consume all available disk\nspace in /tmp when opened. The Common Vulnerabilities and Exposures\nproject assigned the name CVE-2005-2097 to this issue.\n\nNote this issue does not affect Red Hat Enterprise Linux 3 or 2.1.\n\nUsers of kpdf should upgrade to these updated packages, which contains\na backported patch to resolve this issue.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012018.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?37fa4d49\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012041.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?576998fc\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012042.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?71aff882\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kdegraphics packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kdegraphics\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kdegraphics-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"kdegraphics-3.3.1-3.4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"kdegraphics-devel-3.3.1-3.4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kdegraphics / kdegraphics-devel\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T11:51:28", "description": "A vulnerability in the xpdf PDF viewer was discovered. An attacker\ncould construct a malicious PDF file that would cause xpdf to consume\nall available disk space in /tmp when opened.\n\nThe updated packages have been patched to correct this problem.", "edition": 24, "published": "2005-10-05T00:00:00", "title": "Mandrake Linux Security Advisory : xpdf (MDKSA-2005:134)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "modified": "2005-10-05T00:00:00", "cpe": ["cpe:/o:mandrakesoft:mandrake_linux:10.1", "x-cpe:/o:mandrakesoft:mandrake_linux:le2005", "p-cpe:/a:mandriva:linux:xpdf"], "id": "MANDRAKE_MDKSA-2005-134.NASL", "href": "https://www.tenable.com/plugins/nessus/19893", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2005:134. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(19893);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2005-2097\");\n script_xref(name:\"MDKSA\", value:\"2005:134\");\n\n script_name(english:\"Mandrake Linux Security Advisory : xpdf (MDKSA-2005:134)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandrake Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability in the xpdf PDF viewer was discovered. An attacker\ncould construct a malicious PDF file that would cause xpdf to consume\nall available disk space in /tmp when opened.\n\nThe updated packages have been patched to correct this problem.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected xpdf package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:xpdf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:mandrakesoft:mandrake_linux:le2005\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/10/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK10.1\", reference:\"xpdf-3.00-7.5.101mdk\", yank:\"mdk\")) flag++;\n\nif (rpm_check(release:\"MDK10.2\", reference:\"xpdf-3.00pl3-6.1.102mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-06T09:24:52", "description": "An updated xpdf package that fixes a security issue is now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe xpdf package is an X Window System-based viewer for Portable\nDocument Format (PDF) files.\n\nA flaw was discovered in Xpdf in that an attacker could construct a\ncarefully crafted PDF file that would cause Xpdf to consume all\navailable disk space in /tmp when opened. The Common Vulnerabilities\nand Exposures project assigned the name CVE-2005-2097 to this issue.\n\nNote this issue does not affect the version of Xpdf in Red Hat\nEnterprise Linux 3 or 2.1.\n\nUsers of xpdf should upgrade to this updated package, which contains a\nbackported patch to resolve this issue.", "edition": 26, "published": "2006-07-05T00:00:00", "title": "CentOS 4 : xpdf (CESA-2005:670)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "modified": "2006-07-05T00:00:00", "cpe": ["p-cpe:/a:centos:centos:xpdf", "cpe:/o:centos:centos:4"], "id": "CENTOS_RHSA-2005-670.NASL", "href": "https://www.tenable.com/plugins/nessus/21955", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:670 and \n# CentOS Errata and Security Advisory 2005:670 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21955);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2005-2097\");\n script_xref(name:\"RHSA\", value:\"2005:670\");\n\n script_name(english:\"CentOS 4 : xpdf (CESA-2005:670)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated xpdf package that fixes a security issue is now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe xpdf package is an X Window System-based viewer for Portable\nDocument Format (PDF) files.\n\nA flaw was discovered in Xpdf in that an attacker could construct a\ncarefully crafted PDF file that would cause Xpdf to consume all\navailable disk space in /tmp when opened. The Common Vulnerabilities\nand Exposures project assigned the name CVE-2005-2097 to this issue.\n\nNote this issue does not affect the version of Xpdf in Red Hat\nEnterprise Linux 3 or 2.1.\n\nUsers of xpdf should upgrade to this updated package, which contains a\nbackported patch to resolve this issue.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012019.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?752f23fe\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012043.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e019760b\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012044.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?506bbd56\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected xpdf package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xpdf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"xpdf-3.00-11.8\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xpdf\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-20T15:24:08", "description": "xpdf and kpdf did not sufficiently verify the validity of the 'loca'\ntable in PDF files, a table that contains glyph description\ninformation for embedded TrueType fonts. After detecting the broken\ntable, xpdf attempted to reconstruct the information in it, which\ncaused the generation of a huge temporary file that quickly filled up\navailable disk space and rendered the application unresponsive.\n\nThe CUPS printing system in Ubuntu 5.04 uses the xpdf-utils package to\nconvert PDF files to PostScript. By attempting to print such a crafted\nPDF file, a remote attacker could cause a Denial of Service in a print\nserver. The CUPS system in Ubuntu 4.10 is not vulnerable against this\nattack.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2006-01-15T00:00:00", "title": "Ubuntu 4.10 / 5.04 : xpdf vulnerability (USN-163-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "modified": "2006-01-15T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:xpdf", "p-cpe:/a:canonical:ubuntu_linux:kgamma", "p-cpe:/a:canonical:ubuntu_linux:ksnapshot", "p-cpe:/a:canonical:ubuntu_linux:libkscan-dev", "p-cpe:/a:canonical:ubuntu_linux:xpdf-common", "p-cpe:/a:canonical:ubuntu_linux:kghostview", "p-cpe:/a:canonical:ubuntu_linux:kdvi", "p-cpe:/a:canonical:ubuntu_linux:kpovmodeler", "p-cpe:/a:canonical:ubuntu_linux:kview", "p-cpe:/a:canonical:ubuntu_linux:kdegraphics", "cpe:/o:canonical:ubuntu_linux:5.04", "p-cpe:/a:canonical:ubuntu_linux:kamera", "p-cpe:/a:canonical:ubuntu_linux:libkscan1", "p-cpe:/a:canonical:ubuntu_linux:kcoloredit", "p-cpe:/a:canonical:ubuntu_linux:kmrml", "p-cpe:/a:canonical:ubuntu_linux:kdegraphics-kfile-plugins", "p-cpe:/a:canonical:ubuntu_linux:ksvg", "p-cpe:/a:canonical:ubuntu_linux:kruler", "p-cpe:/a:canonical:ubuntu_linux:kolourpaint", "p-cpe:/a:canonical:ubuntu_linux:kpdf", "p-cpe:/a:canonical:ubuntu_linux:xpdf-reader", "cpe:/o:canonical:ubuntu_linux:4.10", "p-cpe:/a:canonical:ubuntu_linux:xpdf-utils", "p-cpe:/a:canonical:ubuntu_linux:kooka", "p-cpe:/a:canonical:ubuntu_linux:kviewshell", "p-cpe:/a:canonical:ubuntu_linux:kiconedit", "p-cpe:/a:canonical:ubuntu_linux:kdegraphics-dev", "p-cpe:/a:canonical:ubuntu_linux:kfax", "p-cpe:/a:canonical:ubuntu_linux:kuickshow"], "id": "UBUNTU_USN-163-1.NASL", "href": "https://www.tenable.com/plugins/nessus/20569", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-163-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20569);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2005-2097\");\n script_xref(name:\"USN\", value:\"163-1\");\n\n script_name(english:\"Ubuntu 4.10 / 5.04 : xpdf vulnerability (USN-163-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"xpdf and kpdf did not sufficiently verify the validity of the 'loca'\ntable in PDF files, a table that contains glyph description\ninformation for embedded TrueType fonts. After detecting the broken\ntable, xpdf attempted to reconstruct the information in it, which\ncaused the generation of a huge temporary file that quickly filled up\navailable disk space and rendered the application unresponsive.\n\nThe CUPS printing system in Ubuntu 5.04 uses the xpdf-utils package to\nconvert PDF files to PostScript. By attempting to print such a crafted\nPDF file, a remote attacker could cause a Denial of Service in a print\nserver. The CUPS system in Ubuntu 4.10 is not vulnerable against this\nattack.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kamera\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kcoloredit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kdegraphics\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kdegraphics-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kdegraphics-kfile-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kdvi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kfax\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kgamma\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kghostview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kiconedit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kmrml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kolourpaint\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kooka\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kpdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kpovmodeler\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kruler\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ksnapshot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ksvg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kuickshow\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kviewshell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libkscan-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libkscan1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xpdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xpdf-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xpdf-reader\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xpdf-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10|5\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10 / 5.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"xpdf\", pkgver:\"3.00-11ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"xpdf-common\", pkgver:\"3.00-11ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"xpdf-reader\", pkgver:\"3.00-11ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"xpdf-utils\", pkgver:\"3.00-11ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kamera\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kcoloredit\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kdegraphics\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kdegraphics-dev\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kdegraphics-kfile-plugins\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kdvi\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kfax\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kgamma\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kghostview\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kiconedit\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kmrml\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kolourpaint\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kooka\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kpdf\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kpovmodeler\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kruler\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"ksnapshot\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"ksvg\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kuickshow\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kview\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"kviewshell\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"libkscan-dev\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"libkscan1\", pkgver:\"3.4.0-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"xpdf\", pkgver:\"3.00-8ubuntu1.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"xpdf-common\", pkgver:\"3.00-8ubuntu1.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"xpdf-reader\", pkgver:\"3.00-8ubuntu1.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"xpdf-utils\", pkgver:\"3.00-8ubuntu1.5\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kamera / kcoloredit / kdegraphics / kdegraphics-dev / etc\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T13:05:31", "description": "Updated CUPS packages that fix a security issue are now available for\nRed Hat Enterprise Linux.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Common UNIX Printing System (CUPS) provides a portable printing\nlayer for UNIX(R) operating systems.\n\nWhen processing a PDF file, bounds checking was not correctly\nperformed on some fields. This could cause the pdftops filter (running\nas user 'lp') to crash. The Common Vulnerabilities and Exposures\nproject has assigned the name CVE-2005-2097 to this issue.\n\nAll users of CUPS should upgrade to these erratum packages, which\ncontain a patch to correct this issue.", "edition": 28, "published": "2005-08-10T00:00:00", "title": "RHEL 3 / 4 : cups (RHSA-2005:706)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2097"], "modified": "2005-08-10T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:3", "cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:cups-devel", "p-cpe:/a:redhat:enterprise_linux:cups", "p-cpe:/a:redhat:enterprise_linux:cups-libs"], "id": "REDHAT-RHSA-2005-706.NASL", "href": "https://www.tenable.com/plugins/nessus/19412", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:706. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(19412);\n script_version(\"1.24\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2005-2097\");\n script_xref(name:\"RHSA\", value:\"2005:706\");\n\n script_name(english:\"RHEL 3 / 4 : cups (RHSA-2005:706)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated CUPS packages that fix a security issue are now available for\nRed Hat Enterprise Linux.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Common UNIX Printing System (CUPS) provides a portable printing\nlayer for UNIX(R) operating systems.\n\nWhen processing a PDF file, bounds checking was not correctly\nperformed on some fields. This could cause the pdftops filter (running\nas user 'lp') to crash. The Common Vulnerabilities and Exposures\nproject has assigned the name CVE-2005-2097 to this issue.\n\nAll users of CUPS should upgrade to these erratum packages, which\ncontain a patch to correct this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2097\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:706\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected cups, cups-devel and / or cups-libs packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cups\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cups-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cups-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/08/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(3|4)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x / 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:706\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"cups-1.1.17-13.3.31\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"cups-devel-1.1.17-13.3.31\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"cups-libs-1.1.17-13.3.31\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"cups-1.1.22-0.rc1.9.7\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"cups-devel-1.1.22-0.rc1.9.7\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"cups-libs-1.1.22-0.rc1.9.7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cups / cups-devel / cups-libs\");\n }\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:53", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "\nxpdf is vulnerable to a denial of service vulnerability\n\t which can cause xpdf to create an infinitely large file,\n\t thereby filling up the /tmp partition, when opening a\n\t specially crafted PDF file.\nNote that several applications contains an embedded version\n\t of xpdf, therefor making them the vulnerable to the same\n\t DoS.\tIn CUPS this vulnerability would cause the pdftops\n\t filter to crash.\n", "edition": 4, "modified": "2005-09-07T00:00:00", "published": "2005-08-09T00:00:00", "id": "24EEE285-09C7-11DA-BC08-0001020EED82", "href": "https://vuxml.freebsd.org/freebsd/24eee285-09c7-11da-bc08-0001020eed82.html", "title": "xpdf -- disk fill DoS vulnerability", "type": "freebsd", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:13", "bulletinFamily": "software", "cvelist": ["CVE-2005-2097"], "description": "===========================================================\r\nUbuntu Security Notice USN-163-1 August 09, 2005\r\nxpdf vulnerability\r\nCAN-2005-2097\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 4.10 (Warty Warthog)\r\nUbuntu 5.04 (Hoary Hedgehog)\r\n\r\nThe following packages are affected:\r\n\r\nxpdf-reader\r\nxpdf-utils\r\nkpdf\r\n\r\nThe problem can be corrected by upgrading the affected package to\r\nversion 3.00-8ubuntu1.5 (for Ubuntu 4.10), or 3.00-11ubuntu3.1\r\n(xpdf-reader and xpdf-utils for Ubuntu 5.04) and 4:3.4.0-0ubuntu3.1\r\n(kpdf for Ubuntu 5.04). In general, a standard system upgrade is\r\nsufficient to effect the necessary changes.\r\n\r\nDetails follow:\r\n\r\nxpdf and kpdf did not sufficiently verify the validity of the "loca"\r\ntable in PDF files, a table that contains glyph description\r\ninformation for embedded TrueType fonts. After detecting the broken\r\ntable, xpdf attempted to reconstruct the information in it, which\r\ncaused the generation of a huge temporary file that quickly filled up\r\navailable disk space and rendered the application unresponsive.\r\n\r\nThe CUPS printing system in Ubuntu 5.04 uses the xpdf-utils package to\r\nconvert PDF files to PostScript. By attempting to print such a crafted\r\nPDF file, a remote attacker could cause a Denial of Service in a print\r\nserver. The CUPS system in Ubuntu 4.10 is not vulnerable against this\r\nattack.\r\n\r\n\r\nUpdated packages for Ubuntu 4.10 (Warty Warthog):\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00-11ubuntu3.1.diff.gz\r\n Size/MD5: 49233 4cd029c1e95456692b26dcfdb6d53ce8\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00-11ubuntu3.1.dsc\r\n Size/MD5: 798 bcb68e7e2d6af0bc9e67f87124ac8bda\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00.orig.tar.gz\r\n Size/MD5: 534697 95294cef3031dd68e65f331e8750b2c2\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-common_3.00-11ubuntu3.1_all.deb\r\n Size/MD5: 56848 14aa94843443c88cb173285fad7f22e0\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00-11ubuntu3.1_all.deb\r\n Size/MD5: 1278 7cb9919819da78b2fd00dcae61bb8c46\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-reader_3.00-11ubuntu3.1_amd64.deb\r\n Size/MD5: 667122 d63c5a97a615fc4f6996eb1c0e0db8d4\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-utils_3.00-11ubuntu3.1_amd64.deb\r\n Size/MD5: 1271460 ba0726cc5834f5c2484241ba3a708a18\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-reader_3.00-11ubuntu3.1_i386.deb\r\n Size/MD5: 631952 4b765c67380a65b3495411cfae390a76\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-utils_3.00-11ubuntu3.1_i386.deb\r\n Size/MD5: 1193432 1c81c58d022a9fc295121d7e3015bda3\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-reader_3.00-11ubuntu3.1_powerpc.deb\r\n Size/MD5: 693470 7b484b13228992748cc7005fd6aba632\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-utils_3.00-11ubuntu3.1_powerpc.deb\r\n Size/MD5: 1311586 8f8dcd99c4de8d58985caa4e3c0e7f8f\r\n\r\nUpdated packages for Ubuntu 5.04 (Hoary Hedgehog):\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00-8ubuntu1.5.diff.gz\r\n Size/MD5: 48457 66dae2ebe77d6c534341081053de0ad4\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00-8ubuntu1.5.dsc\r\n Size/MD5: 788 416e2f1981d1ee9ee840fea169647dd5\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00.orig.tar.gz\r\n Size/MD5: 534697 95294cef3031dd68e65f331e8750b2c2\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.4.0-0ubuntu3.1.diff.gz\r\n Size/MD5: 154890 bc6483123ff12803fffe3aa2bda692d3\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.4.0-0ubuntu3.1.dsc\r\n Size/MD5: 1373 7a956fb702674a455d412820e0451495\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.4.0.orig.tar.gz\r\n Size/MD5: 8099991 c60ab0a0d727701144b5342dcbee201a\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-common_3.00-8ubuntu1.5_all.deb\r\n Size/MD5: 56544 3d224afc953de8a9b435442e660605ee\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00-8ubuntu1.5_all.deb\r\n Size/MD5: 1276 9005b58cff86bb092a9517f5f23922a4\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.4.0-0ubuntu3.1_all.deb\r\n Size/MD5: 10300 ec94e5f36fb820b7d4bac5cd2ac33534\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-reader_3.00-8ubuntu1.5_amd64.deb\r\n Size/MD5: 666982 fac1e20d36a73d5ce7fd9ab14687e334\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-utils_3.00-8ubuntu1.5_amd64.deb\r\n Size/MD5: 1271400 7a81fc269ab824bbd33a229c77dceaad\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 81916 ba96be6d955eea5a25f243099b96fc98\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 93520 af0a0643f8e6239dca5ebfabb7542279\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-dev_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 58796 56d634ffdf6a30b2b1f6befe87284c7b\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 264398 a76e455377a8186876e92b637ba4d812\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 504812 39329ab1c8c37c7e20fc3586ca34dc1e\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 142990 f5f4425b604a830058e0e1dc858a8f1d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kgamma_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 76088 7cacd1083ecc2af8bbd8c74bfd4e6e0f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 231168 d5e0053c78445904724f39dd577f5053\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 137534 bb441cb229f3fbdd86da8784d7c6c75f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kmrml_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 227596 0b0bc954f8723130a145bf1ee70168f5\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kolourpaint_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 798720 831c2bfa32699f271a0fed894f271c0f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 753156 278e9b51ac65ee737692d49ca65fb5e0\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 657458 50e033dc500e0186702419239dd9536c\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kpovmodeler_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 2239588 1db84a1b3b77b69b50b2902746411fb1\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 56308 209b274d36be561c22705578e1bc7656\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 132142 3762b1853a272edce602dddf68d57a7c\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 1216632 899ceb59f17a0163b78bd8d5cf48eca3\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kuickshow_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 471318 39e2e4c6a32ecdf4021e7e0a9ad9530a\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kview_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 685498 a16981238b4a1d0041fa43a3b743424f\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kviewshell_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 255776 e3a8bde867881d5de2403aee14722597\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/libkscan-dev_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 9700 fb007ba8f7cb7a94e77eb2daa20348f0\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.4.0-0ubuntu3.1_amd64.deb\r\n Size/MD5: 133834 ffc81571e412551c39b1cad094d0b9a3\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-reader_3.00-8ubuntu1.5_i386.deb\r\n Size/MD5: 631920 01510acbcd8381c6606e6e1c00b0ea0e\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-utils_3.00-8ubuntu1.5_i386.deb\r\n Size/MD5: 1193890 b757f37d5108f0aa597490dc399c33ff\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 78352 311f0453459518f68031a60b4633643a\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 86298 5ef24892b3707c4e3992275da924a4a0\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-dev_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 58798 2d4eeecf709b0d0c08924710158ccfe2\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 221794 9a6304ce578d798d86abbb324bcda58c\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 495944 2304daead52107020e668044373d794e\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 135958 9892ecb3e9f604b2327113ad2b9dfa5a\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kgamma_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 73232 50089e6ec7b1acfac746d492cda20beb\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 220250 f47201168e9c6e2cd3ff618b3577c2fe\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 126060 ef39bd9a675e8e7201f42c06ad224f59\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kmrml_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 210146 d95c29cd7b0b33d3bc1ff3538f0989d4\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kolourpaint_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 766914 cade32ee0e0832ecbf2d358baa04dade\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 738262 107240bf57ce6d381305094289616124\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 611796 9c2cce47121d9ac7f456e92024fc1d5a\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kpovmodeler_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 2168772 8fee82a345bea676764cd9373c60d802\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 54816 4de21ab1116d2fe44b3063284742a542\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 128778 f40d74f86c84c3c02dc032133f022b69\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 1195566 018488d1d644a30a4eab558b36ab58db\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kuickshow_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 463408 b1f830fcfae3200986b32dd6088abad7\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kview_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 648282 dc4d632c41f0f49f183c9e1388b8354a\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kviewshell_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 237694 7747872b0920530b186ca884208566c7\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/libkscan-dev_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 9696 00a5c7cd8fe7c6c42ad4bf961c25d9b8\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.4.0-0ubuntu3.1_i386.deb\r\n Size/MD5: 125086 c55fe18ca690db7e8583b25ed87570c2\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-reader_3.00-8ubuntu1.5_powerpc.deb\r\n Size/MD5: 693162 60c5ad23ed7ca7915f4e11aae250db82\r\n http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-utils_3.00-8ubuntu1.5_powerpc.deb\r\n Size/MD5: 1311540 2b8690e3044f7b88760c5acef63bbcee\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 79062 6ebe3fd2395a6da4347aab787f9bb33e\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 88208 3d4c5c33a7fbde54525fec264ac0599f\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-dev_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 58808 85c91edda625847e6eeccdb0d2a01e11\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 260346 2ac7795f52efc1c821041284b1e9cf00\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 493320 a6cfdea42e87d5c57c231134288e96de\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 138464 0e1b165ae8abe63c431ed5e050720b52\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kgamma_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 73874 6b20857f99469b77a539049fcc0c33a4\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 222482 081566f7c026eb2447faec407dfb86d6\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 127262 5d17635f5447882bd3a69338135f2746\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kmrml_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 215724 a8f03074461cd1cb7029104be0f6f536\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kolourpaint_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 756880 b7e2c36791baad6b8d95b0a421ea720f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 738244 d7d81cbf500bcdbc5ea7513da4aba3c7\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 628970 b4bd7761e217af8b727257a42ec7bc58\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kpovmodeler_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 2151892 9c15e838f10940a000d82cfcb690ea60\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 54402 530562c13d720afadca85773f9c8936e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 128500 29bf768d0f438d74e2d4ce8e3cc3e026\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 1178820 5c42d32c9e9bd1d32d314473e1e2be8e\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kuickshow_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 465182 2fcd8f23d26ae6c1955fe61c4ce2763b\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kview_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 682210 3c3c96dbdd52a9fc202b8efb16c4efee\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kviewshell_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 238610 c2ead499fb239970ec1f04b92e743af2\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/libkscan-dev_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 9696 2d68e1ebd7b569a7b99398699ec85f5f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.4.0-0ubuntu3.1_powerpc.deb\r\n Size/MD5: 126898 15908f0ef707a5d6dd7421f9108871b5", "edition": 1, "modified": "2005-08-10T00:00:00", "published": "2005-08-10T00:00:00", "id": "SECURITYVULNS:DOC:9434", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:9434", "title": "[USN-163-1] xpdf vulnerability", "type": "securityvulns", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "debian": [{"lastseen": "2019-05-30T02:21:48", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1136-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nAugust 2nd, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : gpdf\nVulnerability : wrong input sanitising\nProblem type : local (remote)\nDebian-specific: no\nCVE ID : CVE-2005-2097\nBugTraq ID : 14529\nDebian Bug : 334454\n\n"infamous41md" and Chris Evans discovered several heap based buffer\noverflows in xpdf, the Portable Document Format (PDF) suite, which are\nalso present in gpdf, the viewer with Gtk bindings, and which can lead\nto a denial of service by crashing the application or possibly to the\nexecution of arbitrary code.\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 2.8.2-1.2sarge5.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.10.0-4.\n\nWe recommend that you upgrade your gpdf package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5.dsc\n Size/MD5 checksum: 1663 d7cd341afa44a55b1d6b6e177506df73\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5.diff.gz\n Size/MD5 checksum: 37001 4c0f08229d68b89376f1dafbd2785602\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2.orig.tar.gz\n Size/MD5 checksum: 1245535 5ceb66aa95e51c4e1d6e10cb29560ff9\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_alpha.deb\n Size/MD5 checksum: 868192 a1165a52e231ad0d7288956259f6dac1\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_amd64.deb\n Size/MD5 checksum: 795826 b77396935f929046e71688cf6c803718\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_arm.deb\n Size/MD5 checksum: 781744 4bd8fcb7aa0e8d8073f9c834f492273e\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_i386.deb\n Size/MD5 checksum: 782022 6e3c2f14a9f79a0fa8d6c7146329cf55\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_ia64.deb\n Size/MD5 checksum: 958464 f60ab132197b6451be37e95c7b0802f6\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_hppa.deb\n Size/MD5 checksum: 859960 52fc5ab1c1c7b0a337093196d08076af\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_m68k.deb\n Size/MD5 checksum: 746044 07af12e76e683943d028347673b325dc\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_mips.deb\n Size/MD5 checksum: 818708 789e70f91a8b43909790389833f5c2f9\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_mipsel.deb\n Size/MD5 checksum: 811194 6f27ce39b1d79d49992ae66e6fc45b13\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_powerpc.deb\n Size/MD5 checksum: 799932 f7f6e5df3d35a4e24ef714a02300bb89\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_s390.deb\n Size/MD5 checksum: 776202 0c511feed7677d69e5e9b901239c25e0\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_sparc.deb\n Size/MD5 checksum: 763980 90c9205b4bc9b61b46d8d46c09e74b83\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 2, "modified": "2006-08-02T00:00:00", "published": "2006-08-02T00:00:00", "id": "DEBIAN:DSA-1136-1:CF3CA", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00225.html", "title": "[SECURITY] [DSA 1136-1] New gpdf packages fix denial of service", "type": "debian", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-11T13:18:18", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 780-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nAugust 22nd, 2005 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kdegraphics\nVulnerability : wrong input sanitising\nProblem-Type : local (remote)\nDebian-specific: no\nCVE ID : CAN-2005-2097\n\nA bug has been discovered in the font handling code in xpdf, which is\nalso present in kpdf, the PDF viewer for KDE. A specially crafted PDF\nfile could cause infinite resource consumption, in terms of both CPU\nand disk space.\n\nThe old stable distribution (woody) is not affected by this problem.\n\nFor the stable distribution (sarge) this problem has been fixed in\nversion 3.3.2-2sarge1.\n\nFor the unstable distribution (sid) this problem will be fixed as soon\nas the necessary libraries have made their C++ ABI transition.\n\nWe recommend that you upgrade your kpdf package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics_3.3.2-2sarge1.dsc\n Size/MD5 checksum: 1317 ebc131e766736e637b2e30151dee6a6d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics_3.3.2-2sarge1.diff.gz\n Size/MD5 checksum: 156211 5d067cd9bc49c92cb7ff7ab98547e23e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics_3.3.2.orig.tar.gz\n Size/MD5 checksum: 7661488 6d0bb2c6e2e2f666d123778fbc520317\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics_3.3.2-2sarge1_all.deb\n Size/MD5 checksum: 17486 9600d747c831ded3133f24e8fa01047d\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 92356 4c27e2725daa34b6fb07d6116b88ce5b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 108972 f5cda9ddad026dbcee8540d8424adb18\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 64878 c3117b2b078b60bb9334abf0d4f67008\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 276102 851cb0bdf23b1f4cd0fd02ca0fcb74e5\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 497444 46c1eddc4353d110a2ad28cee9d1ac8b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 149196 10d492126b04fdf42b97f9c9844e5bfe\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 92818 104aa6a68ef4cde228cce3d743c168f4\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 245808 789f67ae1a03118d18c529ae5f14a2b6\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 159402 d9048b984c10f5c100b790ab897289f2\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 244430 0bcf5aed02cc7d2e2f686cde7e978276\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 831072 cd18f57535cf1d312b703195d396e291\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 773948 edc09d16e385f33b01eca8f9b6e48a58\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 533544 8067051311d0097925f3af26c6294584\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 2317434 5ce4f90805dfa611a4aa227865986699\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 63278 a89aa5eb359a1adfa1f7e1915748d870\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 102972 2b985ab5814c9ade0534d863317f4aa4\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 1357518 165a6c673b0e33afbea05acc70bf39e3\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 483676 cd5261b36df303d20117a8e825e95bc8\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 695300 9e0733ad5df4938a625a8cbaff21ef8d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 183748 0fd1d18659e24f3c8f89d7b4995f39d6\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 32988 29faf48a61b1b1c84128266bc2ffa5c0\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_alpha.deb\n Size/MD5 checksum: 148100 75b6adc0628036a33ff1d51efdc189aa\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 87822 9b70fbc748a9f68e3a5a0f368f3e1ddd\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 100170 52654d65b477a8710d3fae0b05780044\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 64866 15e1090f2d6df0285e8292500cba399d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 252012 a142a51484236f807cbbb6c56044c67f\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 485570 30eddb1e715932a7d0f81ee2cf7de05f\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 144764 2908552d351bf72d8fda19a6b90fc590\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 87740 1db646408a94a7e300d75c1ee02e79d8\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 233808 103e4e6cff812c6ff7d42d7ad3488c13\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 143346 7a64fd82ffe7e711e48786fd309d6e6b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 233772 4bf40313e69524fc332085d433d5159c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 767846 7530fbe924a8b3b3c23b9292c317cc63\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 759514 2613924ca4b572a529cf66457470641c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 485156 23079b6afb891ad7c67d993769e1032b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 2233214 6b209ef37d36fc05c93da3d2a76a86b3\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 62948 0d5e479c4666c5846d702acfb56148bd\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 99710 2646c4a54dec994a965206db747171c8\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 1223308 5a7fd59c6e9d4776496e2d725fbed82f\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 477530 5b57d3556fe792dcf4c0e007540159f7\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 678468 68dd6c149c823ff56fc5b57e4229706f\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 173086 c9dcda7de7b5ad7e3a1508fedc75ad8a\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 32994 b3588ac77645aef9cc92a83540730346\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_amd64.deb\n Size/MD5 checksum: 140022 22f630ee494bc7eb519bcc14313d5e4a\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 82250 baa085ea19330e84a3abd94515f7d168\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 88270 de3365d10776d55e1c1620446d981dc6\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 64878 90c7b3c1a7582132eb0603d68168a1b4\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 222850 0978d21e0a96f692b8baba4114ee7baf\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 471158 918fba19e1e109ac537c68249fa7a593\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 137128 70a843a27e9eea52cf64e05387fd23e9\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 84842 5249716c2180c3a5edb9003d55c3e8d4\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 217360 74506141d685fed97522bab470398d6b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 127438 48c96cd302fa42b8dd8496a1be98715b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 210156 1e7ad00b372fedcda81819c359b9ae93\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 712084 a8e1401f9bc24bc6539576cefecdbab8\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 739560 03766cf0162fcef8770f30e9f4c78109\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 423288 528e4c9ebfb6b8a8ba551e74e5f2c998\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 2095070 2c348b48f42318daa7b0b8fb07057257\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 59132 bfe30049a7e51439cacf0866381de862\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 93222 0e7e96628b9b435bb83a36bb0e75ad2b\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 1310338 350d11c901c66df3091b6f479eddfc9d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 465346 006f11dc8480026403d19d7b0ee6026f\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 641186 67ae9d88bd380387cdf07b02e30b68b2\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 155020 7f6f38fdc117b74fb6b5bc69f760dfd7\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 32988 24b564b6b4141c41bce3117a2701cec8\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_arm.deb\n Size/MD5 checksum: 124092 a99ee9bb137695753f695d0da022e82b\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 85780 0b9e0deed6bcab59e670dcf2760308e6\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 95314 97ac302e5db1dfcdf2fe46855e26dd2a\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 64864 620508089c05d1b0456e1a5db2430db6\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 221892 2fcffb325ac45d375ff1c4c7fda70c58\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 483818 e45b8ea73f0c13ae42b179c2fa5aa7d8\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 140348 f54982596f6c3a4bd964a00d4d0dc5f7\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 85740 9f4464544e5b2896fdd42099c1c86055\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 227328 be30e2999fb858c6e847dcf36887b698\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 135762 6e79cfe95f146487c7ce6de512cec79d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 221624 55e6379db91b99e88e73b4840723a8fa\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 748206 253c62defc69c4e69309162911a4bda2\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 750498 6e3161933baab955b5b36549b7d27334\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 454320 b4fdb5150ee80ebe04479352b242d9bc\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 2205602 6a44f65836b3d118b12528d9d9afb0d7\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 62410 225ebbf024611ebce3279c0b9e2bef51\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 97088 1054e3ed216b5035f03d3cabe1010dae\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 1220680 272d37d7cfcd602de64f6fa244c543ff\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 471924 83fe637bc5d26ade669c418b0af93349\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 643350 beeb0328d200bc76156d5c4906e1402c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 166782 21425caeb998dd65bde7294f61742d92\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 32978 1b9385e4a9c8cb8ac4ff699dc9f5d607\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_i386.deb\n Size/MD5 checksum: 134396 bfe4a49fe1c48db380785a508def451c\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 102276 7943e7d79593c34fce37c1159d5cf30d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 117668 16e8c83cc8bac934cd6417558f48a865\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 64862 3a0bb2ffe69f7b9ebcad173b3d4f454a\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 322810 096f9b6fc92f07ffc5324412192e2fb0\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 540486 e7636ee1c96f011c99b3bdda0f454ca1\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 159954 f05d11d592b614a1d5a63775572761d6\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 103796 d0464c7c06329341264a46aa7c70fafd\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 280668 a688c33a6aec49d8f2d160b659c6389e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 176048 feaa27c1b0c4b0bff24089f21f659866\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 277174 bf70614f4124c05106ef38de41b309ad\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 888280 1f0db827084157085cc0954347e6b171\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 798870 55a2f927e0deb69d76a588dae8c72965\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 627928 eea827b424a36172321aca0789de8afc\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 2537722 8b0dc4b6f1c76e08856f42350552ff4e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 67638 1b9045214e78444184b7683a4f91a586\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 108022 31e80a57966978d153ebd8098790aaff\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 1417004 c13497b6acc7dd6930a1edca8fd09d3d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 501472 5a3191e0e8deeb9c56fcb06ed58f4643\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 730606 f7043373440068b8914afe2baa5daa54\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 205628 5c60f9c851df54ed0a09ca5185166636\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 32976 130ba280d27394752188d1d90dbe3c3e\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_ia64.deb\n Size/MD5 checksum: 170370 64acfb358a86e9a06f69cc4ea73122b1\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 93096 d38c27b5506f93ec96f948727cc9baa0\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 101112 bded9edb4b753643dfbcc974b99d6b1d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 64882 39c979ec183f2594d2b52af9224fe29b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 270810 8be38e93f342a784fcc9c48f8d410f4a\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 505280 7557e2ced9d452771b3c623e30f9b04c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 146084 6ea6d794e0598b824e73e6d47782e95e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 93092 3a8fa68467154912e47893eaa801c83d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 250044 c93ea94728bb1f3547b711d344dc24b9\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 146234 9d9b89cd7a246a9f615df71d3d4b1046\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 245892 4fec5f17c12ba0e408bd0b0057a51a3b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 796792 f9c5b7213420aab5c4f50e90e23e94dd\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 757362 ec9ea8880050908af8aaa5080f9c177f\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 534422 9b4b618a81360b5491462c8761c5927f\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 2371418 b263190d09768f93297e46cc18e61f0e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 61278 e9f36a960a51c9905b2e1a8bf4b66f0d\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 99074 8b39b0e6e134a000c270fde8c9957000\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 1562880 7184dab40b2b41156b65fb7bf4bd50f5\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 484934 e13e6905bc9ac970ccafce9c91a0a96e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 700724 b4634e9d684b3f19a3cba397e535c624\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 183716 f4c153855d51c551d231898ab0b33aa7\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 32990 952b03303720e7c2502051a2625b98c3\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_hppa.deb\n Size/MD5 checksum: 147872 08519cd71aff44a3ef78736d3f68320e\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 85230 3040f0a7f66b4bf7f14b52e9acfa91ca\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 90964 3407d1ccfc1fd93229dab1eb72a34e65\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 64908 5ef8a19cadca3c38401611b243bc3d47\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 229406 9fb15bce4479875807ffe0585187b6b3\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 476834 0b3ec79283328c3b4249deaf6ab9b80c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 138420 8f6149a1743bb04c6337328b07634f73\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 85060 486d146f89c6c1c8c4b70afa3785db48\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 229240 fa420ebaf217142fb583efa5ae59a228\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 128490 323645c377ce97f149a9e78f43e2f9e9\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 223438 3c4f4d0c11c07304cfad7b8581c2dcb7\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 704958 fc851084f01843e18402820f5ac2bb8e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 743020 fe1a6b7676ad3d5dcf36f982dbb0d554\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 446880 fe7bf58dcbe5faf3866cf036d41f7c47\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 2148644 00b8c80b12a74297b7de146e34eb33da\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 61148 861d3abf2cec8f3aee4965e05b6fa202\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 96492 653f26d8548d7084ef1bb224d292123c\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 1315818 5e938eaf20fd5470c8980316c5876199\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 475692 ffea8216d80fdb00cc9c80afa6d97f9c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 682378 8b7fd3e5440812f15017affb527c564a\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 166130 4e372046b447daae596c08e0fafdf080\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 33004 05e93f6e5a82c03ab2203dd71a680741\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_m68k.deb\n Size/MD5 checksum: 133822 fe651394adaac7f5b3def2b4525927db\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 79588 320ba0454eb9e8f1e9a483afe399ce6a\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 102400 f3e438dac8d4f2d1a05f8b92999b4ee8\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 64876 1672a7f2272c716d00cbc21c02cecd1c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 217786 cec5fd2f96408b43c4dbbacac292e6e6\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 460916 6b371e06097c9e3838d8585d736435a2\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 140418 8a276f8fd9fc89db59745696e4e58d58\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 81714 f1708aff28fe181b97ac5cc1b951e136\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 215620 5f29d8e3f74702b68a63fb78171c526b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 146072 2dce253a63aa782f199df2f911fbc7c0\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 203910 6ca8cc54360ed49620385ab2e9a829a7\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 787874 f11abbe9095a2b591749ecbbc13ba513\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 756042 b2bf9e8f6bb356068907b74f2caded32\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 455090 a86a475488df75d136121ce304df3181\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 2057250 a4d702b4ff8fd54ac3a262865149be8f\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 59144 f4b88416a21e24c331d7316a146d9c73\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 97620 4df70ac97b5e757bd416d553c48f4b94\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 1126910 73dc17f6e937d8ffd1d5501450afa2e9\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 463526 8654998c9ed3ce8c5258c017655ec70c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 649620 d6329d53115728e9cee4768b4175806f\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 156680 f9ae5b8328100bf48d3f07423ffd9f42\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 32994 e022e06fc47d21efad8b685d4813c1bb\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_mips.deb\n Size/MD5 checksum: 124426 cd29a2aa6b1ee6b8e00901b3b526cf37\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 78940 c4b8c8a2e7b1001dd18d7daa11c7b3d0\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 101482 36d3640c5c2a21943020ac8b93a0eed6\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 64876 a778abe63cd4f5a8d62549bed4db3095\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 215718 edcc26b455a5d02d4cc9091fb85618a6\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 459532 6000a088add7baa74be611a1bc3767d3\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 139428 6c05ed943a63af873cd146a5e736e712\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 81244 5c09e46538b536695705ed69f5237d82\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 213098 d5954f887dd74d0a7d7dc08eb39918ab\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 144418 e593de07d81e7a2092b575cd42aae48c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 201506 19c01b98e37656aeaf19ed5d7e5a8247\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 785098 a0443b6d1f2773078d9a3ad84543c92e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 754142 6673724060c082355cda60221bde6c46\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 446138 f819386cd621c72aafb09a34e3144461\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 2045876 0956e236ace9fb7ce7f793a42a9219d9\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 58940 f81b3569e14fdf5cf4c2edf229fd3c58\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 97060 0b5ebfc3a37a80aa4c93d09d0ce043e5\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 1101628 e5307ba00875593a9112a8e30b06a88c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 461734 34e7ae162e22fa71f6fc9fea69ea38f9\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 647112 e88c39705646803cc708b917cc8731ec\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 154552 01fc99c1813bc2f27f6ed13f372fbd91\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 32994 2a97a9b8bc15ba1aad2aa76fd1091058\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_mipsel.deb\n Size/MD5 checksum: 122262 25f9a25485f7b0043aab4e96f8c957ab\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 84522 0617f2a2fe79050cbcd5c0433eedb574\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 94448 516a319c0c18330abadb82909381ebed\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 64874 380e4550895d3fadcd4f3c38ec7220c7\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 249430 17f00270dace7349c321b60de40e3468\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 474482 dda4fb9b4e16a8b89baa7cd73e91a855\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 140562 a37db7a33179632530023b5131dc303b\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 85044 723018269d7e73d1455c42bb949c1768\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 224698 b6111fce26efd57be09d60651da5f06a\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 132408 5b14c8db5bc18ba694e39fd538a6a52e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 222062 f7d77920b4e7f8cb17cfac598a17e651\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 725218 a4b7060974a5d7e66f1a22a5647a8943\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 744026 6ee3f53591229aa0a51b206d29f7a2b1\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 463888 cb328f7734f828bfdafce5e9adee7b44\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 2142194 28078f8a60724c07ae1ed22a4c2a1228\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 60900 3a900ba50b543f5c68a7ccbda282f0f7\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 95412 e613520b6600ba2b32c74329aee39fce\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 1190936 7455b476d5a6ce576dd533d45feb8d18\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 470052 4f4180ad347d8b0fe1107ab77855cfb3\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 676116 3480412ada6f951989fb7febfe76a477\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 161618 5279d08eeedae2b40b2840f7c56530e3\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 32994 c499e55139c0fd45936553b6758070e7\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_powerpc.deb\n Size/MD5 checksum: 132134 668beb1bc70785025540c3a3d0645079\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 89736 7c15f232d98f4dda0777459e8f0f6c9a\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 98204 fcadd968fe6a1b1997d7e429f9fdb650\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 64886 ad0a3a89d75c1640a907dbe1213c7cbd\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 236354 beda8d86130a8c7a17a41347e55374c8\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 484838 60237ce47ec2423ae10bf3eeb0789832\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 145274 f46a5698b53dfd97432a6099acc60d7d\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 87022 3d9ba22c0088ad1ee9de4b3ebce790ab\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 243994 dfbb12197898760c72b51d6f82c1f0e2\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 140706 827b336106370c0d23774360b199a559\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 239570 b131f59238085a6c150e77f8eaaf1a53\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 765814 9e90d82ee36e8e981706380edfc9c305\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 755476 7ffc4741649f07d6fb5e3d90fc5b6aaa\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 495884 cce1b4d0b29d6dc078ee6bcbae2590fb\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 2195546 1a3d8fa2745f03f9402afa32d32a0dc4\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 62930 cc788509b94f7d0a57bdfc2ac064e27c\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 100612 a3a3c5e08e897420a9ccd9a727ac5c03\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 1192422 971bc9b9538a9b260e417345a4eed8f5\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 481556 546615b8b19d828d0efb8bb56190d125\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 682606 ac4dd3ad2e14a2f5bfc9afb76632c44a\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 176528 61bc8c16536e23d9773d944c939e2b49\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 32996 c87893ae398552624923d9754f6b04b1\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_s390.deb\n Size/MD5 checksum: 142084 7370c1b25e69613a67e35241ba9069cc\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kdegraphics/kamera_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 82148 e50dba5cc6e0b7e797da9e433588639c\n http://security.debian.org/pool/updates/main/k/kdegraphics/kcoloredit_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 90598 e5500b0a121d7174ffe679508ddb678e\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-dev_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 64882 bcb34167497b09494ea322ee940cde4a\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdegraphics-kfile-plugins_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 219056 fb9175c22e4deb27e90cac82c5435664\n http://security.debian.org/pool/updates/main/k/kdegraphics/kdvi_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 477400 f6977c7e0665a7d29f00e1650aa15112\n http://security.debian.org/pool/updates/main/k/kdegraphics/kfax_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 137828 3923fcaf462f186ec91f3ddc202caceb\n http://security.debian.org/pool/updates/main/k/kdegraphics/kgamma_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 83088 e63c234c8b89c7285982132706985602\n http://security.debian.org/pool/updates/main/k/kdegraphics/kghostview_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 223650 970d8542a751276c909f278e9b9ca6de\n http://security.debian.org/pool/updates/main/k/kdegraphics/kiconedit_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 130392 97d0bfdb0e38e42ccb4050ac0e3d47cc\n http://security.debian.org/pool/updates/main/k/kdegraphics/kmrml_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 213450 84f231185dabc68bcb559af0b35162ab\n http://security.debian.org/pool/updates/main/k/kdegraphics/kolourpaint_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 714028 88f93090d95e279aaf7b38babfc076d0\n http://security.debian.org/pool/updates/main/k/kdegraphics/kooka_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 743910 dff4d2991ab5362385544efad3a1e738\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpdf_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 450642 c536522c3840cf8b34126c446ce68742\n http://security.debian.org/pool/updates/main/k/kdegraphics/kpovmodeler_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 2142452 48ef73ee9308053a61fce78b39db5216\n http://security.debian.org/pool/updates/main/k/kdegraphics/kruler_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 60052 abaf5f039ce2e023813ab9eece9dbc61\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksnapshot_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 94976 9122cbb5dc7fee95b4368bbc3ceed05c\n http://security.debian.org/pool/updates/main/k/kdegraphics/ksvg_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 1175106 39afbc8da08d463daa645011fdaec3fe\n http://security.debian.org/pool/updates/main/k/kdegraphics/kuickshow_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 469076 eeac80b33806103b9a8d18ed0d4c5f40\n http://security.debian.org/pool/updates/main/k/kdegraphics/kview_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 639578 7d3cb4797f6cb158b2205d05e9914695\n http://security.debian.org/pool/updates/main/k/kdegraphics/kviewshell_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 160172 c10f53d6c2cbf50c8d6ae2d3b099b030\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan-dev_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 32994 9309c7b9d6ffbaf26742a4db7812cdbc\n http://security.debian.org/pool/updates/main/k/kdegraphics/libkscan1_3.3.2-2sarge1_sparc.deb\n Size/MD5 checksum: 128624 95cc552be640dc74963663358b917d24\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 7, "modified": "2005-08-22T00:00:00", "published": "2005-08-22T00:00:00", "id": "DEBIAN:DSA-780-1:31D4D", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00168.html", "title": "[SECURITY] [DSA 780-1] New kpdf packages fix denial of service", "type": "debian", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-11T13:15:54", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3627", "CVE-2005-3192", "CVE-2005-2097", "CVE-2005-3626", "CVE-2005-3191", "CVE-2005-3625", "CVE-2005-3193", "CVE-2005-3624", "CVE-2005-3628"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 936-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nJanuary 11th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : libextractor\nVulnerability : buffer overflows\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 CVE-2005-2097\n CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627\n CVE-2005-3628\n\n"infamous41md" and Chris Evans discovered several heap based buffer\noverflows in xpdf, the Portable Document Format (PDF) suite, which is\nalso present in libextractor, a library to extract arbitrary meta-data\nfrom files, and which can lead to a denial of service by crashing the\napplication or possibly to the execution of arbitrary code.\n\nThe old stable distribution (woody) does not contain libextractor\npackages.\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 0.4.2-2sarge2.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 0.5.8-1.\n\nWe recommend that you upgrade your libextractor packages.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2-2sarge2.dsc\n Size/MD5 checksum: 778 6906857074772199e2a8a892feb3aae2\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2-2sarge2.diff.gz\n Size/MD5 checksum: 6345 c214699bde0bfad501cede35488b4f09\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2.orig.tar.gz\n Size/MD5 checksum: 5887095 d99e1b13a017d39700e376a0edbf7ba2\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_alpha.deb\n Size/MD5 checksum: 19424 59bb8cddd5c80fb1cba57796b9445dab\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_alpha.deb\n Size/MD5 checksum: 5804676 9942575a95cb97dfcae26b156dca7a58\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_alpha.deb\n Size/MD5 checksum: 19204 fed48ebb930e6a7d3484bd75c8263a81\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_amd64.deb\n Size/MD5 checksum: 18098 7d4a40679062c4d2d70f9c08dc785559\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_amd64.deb\n Size/MD5 checksum: 5641300 ff1bac0e15d1a6ff630a6ced168e284f\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_amd64.deb\n Size/MD5 checksum: 17364 54dd55236286550d6cadc8dbb3df9ccd\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_arm.deb\n Size/MD5 checksum: 17480 aa541fc867f51588b676aa23d34e25a8\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_arm.deb\n Size/MD5 checksum: 5710616 ed153d5e88e899f4e27ae5a67c5e45d0\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_arm.deb\n Size/MD5 checksum: 16784 7a7f73139e8c0c62187179e993734932\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_i386.deb\n Size/MD5 checksum: 17624 5419b495e3df96a658e1323c83f7faf9\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_i386.deb\n Size/MD5 checksum: 5713300 1bc2a3ab8b321b543a1ae92590e76f8b\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_i386.deb\n Size/MD5 checksum: 16546 71e4044ff8d923cd56d4bb046be1b37f\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_ia64.deb\n Size/MD5 checksum: 20404 cdea8cf2f6cd2b8a761ccca2a2d85421\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_ia64.deb\n Size/MD5 checksum: 5905266 98f5de1716817b660791a92d5ee7c6a6\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_ia64.deb\n Size/MD5 checksum: 19140 d780e22f3cd6c6204de3db711f068dcd\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_hppa.deb\n Size/MD5 checksum: 18560 70ae8b43a0cd581a36a8097fc94c2172\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_hppa.deb\n Size/MD5 checksum: 5687318 a241f7e800ac5cbd7f45fdafeae267ac\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_hppa.deb\n Size/MD5 checksum: 17710 c1848801758081872515d88f86938537\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_m68k.deb\n Size/MD5 checksum: 17184 d64fcc89500919e03805e47dbb9eca52\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_m68k.deb\n Size/MD5 checksum: 5708190 0d20df48cd437a99544bf748a1c89ea9\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_m68k.deb\n Size/MD5 checksum: 16404 0e47447d4b7007d4016c32a81f2b66f4\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_mips.deb\n Size/MD5 checksum: 18416 38f460cbf16a6c2a3c735c5a6545013a\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_mips.deb\n Size/MD5 checksum: 5729074 76787645b83e4438fc79325410114c99\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_mips.deb\n Size/MD5 checksum: 17700 8cbf4e1556b59d982589d27e5af1211e\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_mipsel.deb\n Size/MD5 checksum: 18460 dfaad60fd479b74c72c46680d92c5920\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_mipsel.deb\n Size/MD5 checksum: 5726846 0d9ad0d53eddd3503cdc2fce6b118595\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_mipsel.deb\n Size/MD5 checksum: 17734 a74a4df56930cd6e1ec289a714fe2225\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_powerpc.deb\n Size/MD5 checksum: 19600 0fbb4093db271d5924d8e1fb81d0c5c3\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_powerpc.deb\n Size/MD5 checksum: 5677812 543192c6a5b6b89fdc0cc0c5b3f2befe\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_powerpc.deb\n Size/MD5 checksum: 17556 bd868a198744609509201e7af0e33ab9\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_s390.deb\n Size/MD5 checksum: 17974 f16109dd971b139abc8a2194731e33c8\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_s390.deb\n Size/MD5 checksum: 5768028 dfda84e8d1a0e53794418a77a09d801f\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_s390.deb\n Size/MD5 checksum: 17918 da3bb3df7f86443b1f36ed4b5bcc0113\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_sparc.deb\n Size/MD5 checksum: 17480 1ef23c92384723ab64b315b7d8d51089\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_sparc.deb\n Size/MD5 checksum: 5752164 91a3ad11d2f029e99955b2c54088e034\n http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_sparc.deb\n Size/MD5 checksum: 16696 87e4150b6738d9921728a1e594bc4904\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 3, "modified": "2006-01-11T00:00:00", "published": "2006-01-11T00:00:00", "id": "DEBIAN:DSA-936-1:CC668", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00008.html", "title": "[SECURITY] [DSA 936-1] New libextractor packages fix arbitrary code execution", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:37:20", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2097", "CVE-2006-0301", "CVE-2006-0746", "CVE-2005-0064", "CVE-2004-1125", "CVE-2005-3193", "CVE-2004-0888"], "description": "[7:3.3.1-3.9 ]\n- apply xpdf-splash-overflow-CVE-2006-0301-fix.diff to fix CVE-2006-0301 (#184307)\n[7:3.3.1-3.8]\n- apply xpdf-splash-overflow-CVE-2006-0301-fix.diff to fix CVE-2006-0301 (#179055)\n[7:3.3.1-3.7]\n- apply patch to fix buffer overflow issue in the xpdf codebase\n when handling splash images CVE-2006-0301 (#179055)\n[7:3.3.1-3.6]\n- better fix for CAN-2005-3193\n[7:3.3.1-3.5]\n- add BuildRequires: libieee1284-devel #168356\n- backport patch to fix CAN-2005-3193, #175105\n[7:3.3.1-3.4]\n- apply patch to fix kpdf DoS CAN-2005-2097, #163925\n[7:3.3.1-3.3]\n- More fixing of CAN-2004-0888 patch (bug #135393)\n[3.3.1-3.2]\n- Applied patch to fix CAN-2005-0064\n[7:3.3.1-3.1]\n- Applied patch to fix CAN-2004-1125\n[7:3.3.1-2]\n- fix kfax to use system libtiff\n[7:3.3.1-1]\n- update to 3.3.1\n[7:3.3.0-3]\n- fix typo in buildrequires #135007\n[7:3.3.0-2]\n- only show kcmkmrml in KDE\n- set variables before use\n[3.3.0-1]\n- update to 3.3.0\n[3.3.0-0.1.rc2]\n- update to 3.3.0 rc2\n[7:3.2.3-1]\n- update to 3.2.3\n[7:3.2.2-1]\n- update to 3.2.2\n[7:3.2.1-1]\n- 3.2.1 release\n* Tue Mar 02 2004 Elliot Lee \n- rebuilt\n[7:3.2.0-1.4]\n- fix typo bug, _smp_mflags instead smp_mflags\n* Fri Feb 13 2004 Elliot Lee \n- rebuilt\n[7:3.2.0-0.3]\n- 3.2.0 release\n- built against qt 3.3.0\n- add prereq /sbin/ldconfig\n[7:3.1.95-0.1]\n- KDE 3.2 RC1\n[7:3.1.94-0.1]\n- KDE 3.2 Beta2\n[7:3.1.93-0.2]\n- get rid of rpath\n[7:3.1.93-0.1]\n- KDE 3.2 Beta1\n- cleanup\n[7:3.1.4-1]\n- 3.1.4\n[7:3.1.3-4]\n- disable kpovmodeler temporary. waiting for freeglut\n[7:3.1.3-3]\n- fixed build problem with new gcc\n[7:3.1.3-2]\n- rebuilt\n[7:3.1.3-1]\n- 3.1.3\n[3.1.2-4]\n- disable kpovmodeler temporary. waiting for freeglut\n- built with gcc-3.3-12\n- remove excludearch s390/s390x\n[7:3.1.2-3.1]\n- added epoch for versioned requires where needed\n- built for RHEL\n* Wed Jun 04 2003 Elliot Lee \n- rebuilt\n[3.1.2-2]\n- 3.1.2\n[3.1.1-2]\n- PS/PDF file handling vulnerability\n[3.1.1-1]\n- 3.1.1\n* Mon Feb 24 2003 Elliot Lee \n- debuginfo rebuild\n[3.1-3]\n- get rid of gcc path from dependency_libs\n* Wed Feb 19 2003 Elliot Lee \n- BuildRequires: glut-devel if kpovmodeler\n[3.1-1]\n- 3.1 release\n- remove excludearch ia64\n- remove some unneeded macros\n* Wed Jan 22 2003 Tim Powers \n- rebuilt\n[3.1-0.3]\n- rc6\n- exclude ia64\n[3.1-0.2]\n- fix desktop file issues\n- get rid of su packages\n[3.1-0.1]\n- update to 3.1 rc4\n[3.0.5-1]\n- update to 3.0.5\n[3.0.4-1]\n- 3.0.4\n* Sun Aug 25 2002 Florian La Roche \n- compile on mainframe\n* Wed Aug 14 2002 Florian La Roche \n- change spec file to work for more archs\n[3.0.3-1]\n- 3.0.3\n- build using gcc-3.2-0.3\n[3.0.2-4]\n- desktop files issues (bug #71018)\n[3.0.2-3]\n- build using gcc-3.2-0.1\n[3.0.2-2]\n- fix desktop files issue\n[3.0.2-1]\n- 3.0.2\n- use desktop-file-install\n* Fri Jun 21 2002 Tim Powers \n- automated rebuild\n* Sun May 26 2002 Tim Powers \n- automated rebuild\n[3.0.1-1]\n- 3.0.1\n[3.0.0-5]\n- rename libraries\n[3.0.0-4]\n- Fix libkviewpart.* duplication (kview and kviewshell, #62749)\n- Shut up rpmlint\n[3.0.0-3]\n- Obsolete the old monolithic package\n- Fix build with gcc 3.1\n[3.0.0-2]\n- fix deps problem\n[3.0.0-1]\n- 3.0.0 final\n[3.0.0-0.cvs20020321.1]\n- Add docs for kooka and kuickshow and kfile PostScript plugin\n[3.0.0-0.cvs20020306.1]\n- Update\n- Rename subpackages\n- Dont build kamera on alpha\n[3.0.0-0.cvs20011226.1]\n- Update\n- Reorganize package\n[2.2-0.cvs20010726.1]\n- The -devel package has kscan-related files -n only. Since kscan isnt built\n on s390/s390x, dont build the devel package there.\n[2.2-0.cvs20010724.1]\n- Add more build dependencies (#48970)\n- Remove ia64 workarounds, no longer needed\n- Update\n[2.2-0.cvs20010723.1]\n- Restore -devel package, got lost during the update\n- Fix build on s390/s390x\n- Update\n[2.2-0.cvs20010722.2]\n- Make symlinks relative\n- Update\n* Wed Feb 21 2001 Bernhard Rosenkraenzer \n- 2.1-respin\n* Tue Feb 20 2001 Bernhard Rosenkraenzer \n- 2.1\n* Fri Feb 16 2001 Than Ngo \n- fix to build against glibc\n* Tue Feb 06 2001 Bernhard Rosenkraenzer \n- Get rid of libkdefakes.so.0 dependency\n* Mon Jan 22 2001 Bernhard Rosenkraenzer \n- Update\n* Mon Jan 01 2001 Bernhard Rosenkraenzer \n- Update\n* Wed Dec 20 2000 Bernhard Rosenkraenzer \n- Update\n- Stop excluding ia64\n* Wed Nov 15 2000 Bernhard Rosenkraenzer \n- Update to HEAD\n* Fri Nov 03 2000 Bernhard Rosenkraenzer \n- Update to KDE_2_0_BRANCH\n* Mon Oct 23 2000 Bernhard Rosenkraenzer \n- 2.0 final\n* Thu Aug 24 2000 Than Ngo \n- update to kdegraphics-1.93\n* Sun Aug 20 2000 Than Ngo \n- add missing kdegraphic2 package\n* Mon Aug 07 2000 Bernhard Rosenkraenzer \n- new version\n* Tue Jul 25 2000 Bernhard Rosenkraenzer \n- new snapshot\n- work around compiler bug by disabling kcoloredit for now, FIXME\n* Fri Jul 21 2000 Bernhard Rosenkraenzer \n- new snapshot\n- SMPify build\n* Sun Jul 16 2000 Than Ngo \n- use gcc 2.96\n- new snapshot\n- fix docdir\n* Fri Jun 23 2000 Bernhard Rosenkraenzer \n- Add Epoch - for some reason, rpm thinks 1.1.2 > 1.92.20000623.\n* Tue Jun 20 2000 Bernhard Rosenkraenzer \n- new snapshot\n- ExcludeArch ia64 for now\n* Sat Mar 18 2000 Bernhard Rosenkraenzer \n- new snapshot\n- move it to /usr, where it belongs\n* Sun Oct 24 1999 Bernhard Rosenkraenzer \n- Fix compilation\n* Fri Oct 22 1999 Bernhard Rosenkraenzer \n- 2.0 CVS\n* Fri Sep 24 1999 Preston Brown \n- mark doc files as such\n* Wed Sep 08 1999 Preston Brown \n- upgraded to 1.1.2 release\n* Fri Jun 11 1999 Preston Brown \n- snapshot, includes kde 1.1.1 + fixes\n* Mon Apr 19 1999 Preston Brown \n- last snapshot before release\n* Mon Apr 12 1999 Preston Brown \n- latest stable snapshot\n* Wed Feb 24 1999 Preston Brown \n- Injected new description and group.\n* Mon Feb 08 1999 Preston Brown \n- upgraded to KDE 1.1 final.\n* Sat Feb 06 1999 Preston Brown \n- updates to new libstdc++ and rpm standards.\n* Wed Jan 06 1999 Preston Brown \n- re-merged in updates from Duncan Haldane", "edition": 5, "modified": "2006-11-30T00:00:00", "published": "2006-11-30T00:00:00", "id": "ELSA-2006-0262", "href": "http://linux.oracle.com/errata/ELSA-2006-0262.html", "title": "kdegraphics security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}