Date: Thu, 15 Nov 2007 13:12:21 -0700
From: [email protected]Subject: [ MDKSA-2007:219 ] - Updated xpdf packages fix vulnerabilities
To: [email protected]
Reply-To: [email protected]
Message-id: <E1Isl4X-0007Ul-FL@artemis.annvix.ca.>
X-SA-Exim-Connect-IP: 10.0.5.11
X-SA-Exim-Mail-From: [email protected]
X-SA-Exim-Version: 4.2.1 (built Fri, 02 Feb 2007 19:02:33 -0700)
X-SA-Exim-Scanned: Yes (on hades.annvix.org)
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:219
http://www.mandriva.com/security/
_______________________________________________________________________
Package : xpdf
Date : November 15, 2007
Affected: 2007.1, 2008.0, Corporate 3.0, Corporate 4.0
_______________________________________________________________________
Problem Description:
Alin Rad Pop found several flaws in how PDF files are handled in xpdf.
An attacker could create a malicious PDF file that would cause xpdf
to crash or potentially execute arbitrary code when opened.
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
84beae3df3a7d401436830b6f2a674a4 2007.1/i586/xpdf-3.02-1.3mdv2007.1.i586.rpm
4d8e70228832c64e7f3918366af039f9 2007.1/i586/xpdf-tools-3.02-1.3mdv2007.1.i586.rpm
367f5f2af7a42a5d8f12f6be791c43a6 2007.1/SRPMS/xpdf-3.02-1.3mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
7f3cbb53f9f1cc6c3d870087f8b41fd7 2007.1/x86_64/xpdf-3.02-1.3mdv2007.1.x86_64.rpm
d585f49400a9e535624dc4fd901ededc 2007.1/x86_64/xpdf-tools-3.02-1.3mdv2007.1.x86_64.rpm
367f5f2af7a42a5d8f12f6be791c43a6 2007.1/SRPMS/xpdf-3.02-1.3mdv2007.1.src.rpm
Mandriva Linux 2008.0:
53a9655e26057cefad52fc64f522476a 2008.0/i586/xpdf-3.02-8.1mdv2008.0.i586.rpm
8bac2df1a50f44e9ae2fcc1d79925921 2008.0/i586/xpdf-common-3.02-8.1mdv2008.0.i586.rpm
3fadcbe185699666c3e5e04d0e9829d2 2008.0/i586/xpdf-tools-3.02-8.1mdv2008.0.i586.rpm
f742203205a23da363628822fb68c89b 2008.0/SRPMS/xpdf-3.02-8.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
7c26280a3afa5ee7642e4b349248f84a 2008.0/x86_64/xpdf-3.02-8.1mdv2008.0.x86_64.rpm
82d23a665b490187655c9d56645a3dac 2008.0/x86_64/xpdf-common-3.02-8.1mdv2008.0.x86_64.rpm
a87a083a3e325de5932d12eb9279afb4 2008.0/x86_64/xpdf-tools-3.02-8.1mdv2008.0.x86_64.rpm
f742203205a23da363628822fb68c89b 2008.0/SRPMS/xpdf-3.02-8.1mdv2008.0.src.rpm
Corporate 3.0:
0d6fc02962af59126e8555a9ceee1232 corporate/3.0/i586/xpdf-3.02-0.1.C30mdk.i586.rpm
805158fdda5e8503ab82b284d9713a80 corporate/3.0/i586/xpdf-tools-3.02-0.1.C30mdk.i586.rpm
d8e06ac57ee49969bafaea2aab61362b corporate/3.0/SRPMS/xpdf-3.02-0.1.C30mdk.src.rpm
Corporate 3.0/X86_64:
2ee284bb47436d10dc76f17c83ed9a0b corporate/3.0/x86_64/xpdf-3.02-0.1.C30mdk.x86_64.rpm
81821c76942a3bdcee9a0c9898f22417 corporate/3.0/x86_64/xpdf-tools-3.02-0.1.C30mdk.x86_64.rpm
d8e06ac57ee49969bafaea2aab61362b corporate/3.0/SRPMS/xpdf-3.02-0.1.C30mdk.src.rpm
Corporate 4.0:
6f9bbe3195219b867fa39c12905809a2 corporate/4.0/i586/xpdf-3.02-0.1.20060mlcs4.i586.rpm
0fd83b6a5f1b16f45ee94230d89159e3 corporate/4.0/i586/xpdf-tools-3.02-0.1.20060mlcs4.i586.rpm
5f75c600f427467d1c30caad8d089c25 corporate/4.0/SRPMS/xpdf-3.02-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
0d9c422f269476c2f155b5074e3aa21d corporate/4.0/x86_64/xpdf-3.02-0.1.20060mlcs4.x86_64.rpm
91ff8618aa404e61f086f744e23f1ee2 corporate/4.0/x86_64/xpdf-tools-3.02-0.1.20060mlcs4.x86_64.rpm
5f75c600f427467d1c30caad8d089c25 corporate/4.0/SRPMS/xpdf-3.02-0.1.20060mlcs4.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFHPI4CmqjQ0CJFipgRAhfyAKC1QBtzO93qXXMS4cheBRDI1oz4tgCgizX4
HhYUS2bOUQhAnUanA1vEdnM=
=POMZ
-----END PGP SIGNATURE-----