[RHSA-2004:592-01] Updated xpdf package fixes security flaws

bugzilla at redhat.com bugzilla at redhat.com
Wed Oct 27 15:40:00 UTC 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated xpdf package fixes security flaws
Advisory ID:       RHSA-2004:592-01
Issue date:        2004-10-27
Updated on:        2004-10-27
Product:           Red Hat Enterprise Linux
Obsoletes:         RHSA-2004:197
CVE Names:         CAN-2004-0888
- ---------------------------------------------------------------------

1. Summary:

An updated xpdf package that fixes a number of integer overflow security
flaws is now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Xpdf is an X Window System based viewer for Portable Document Format
(PDF) files.

During a source code audit, Chris Evans and others discovered a number
of integer overflow bugs that affected all versions of xpdf.  An
attacker could construct a carefully crafted PDF file that could cause
xpdf to crash or possibly execute arbitrary code when opened.  The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0888 to this issue.

Users of xpdf are advised to upgrade to this errata package, which contains
a backported patch correcting these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

135393 - CAN-2004-0888 xpdf integer overflows

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/xpdf-0.92-13.src.rpm
eb893292a8acc37274ca39ed1c5167b7  xpdf-0.92-13.src.rpm

i386:
e7fc401fa264c14f291722cc6882bace  xpdf-0.92-13.i386.rpm

ia64:
59ff577e0a5f8690fd2f866698c18a24  xpdf-0.92-13.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/xpdf-0.92-13.src.rpm
eb893292a8acc37274ca39ed1c5167b7  xpdf-0.92-13.src.rpm

ia64:
59ff577e0a5f8690fd2f866698c18a24  xpdf-0.92-13.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/xpdf-0.92-13.src.rpm
eb893292a8acc37274ca39ed1c5167b7  xpdf-0.92-13.src.rpm

i386:
e7fc401fa264c14f291722cc6882bace  xpdf-0.92-13.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/xpdf-0.92-13.src.rpm
eb893292a8acc37274ca39ed1c5167b7  xpdf-0.92-13.src.rpm

i386:
e7fc401fa264c14f291722cc6882bace  xpdf-0.92-13.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/xpdf-2.02-9.3.src.rpm
d5e0ad682a7e83311d5588ef25984329  xpdf-2.02-9.3.src.rpm

i386:
c62ccce8752958320f429b2f0275b583  xpdf-2.02-9.3.i386.rpm

ia64:
5e54249c54111231f3e75f82dd7b7382  xpdf-2.02-9.3.ia64.rpm

ppc:
5d9553b6885a16fdf76e4e5d6124ca3d  xpdf-2.02-9.3.ppc.rpm

s390:
933965cf519099e14f691957821ed33e  xpdf-2.02-9.3.s390.rpm

s390x:
bc33104553fa2bc65484df8b0cdfc214  xpdf-2.02-9.3.s390x.rpm

x86_64:
a5a3d7385ddd6a097a28bbf61e0191c6  xpdf-2.02-9.3.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/xpdf-2.02-9.3.src.rpm
d5e0ad682a7e83311d5588ef25984329  xpdf-2.02-9.3.src.rpm

i386:
c62ccce8752958320f429b2f0275b583  xpdf-2.02-9.3.i386.rpm

x86_64:
a5a3d7385ddd6a097a28bbf61e0191c6  xpdf-2.02-9.3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/xpdf-2.02-9.3.src.rpm
d5e0ad682a7e83311d5588ef25984329  xpdf-2.02-9.3.src.rpm

i386:
c62ccce8752958320f429b2f0275b583  xpdf-2.02-9.3.i386.rpm

ia64:
5e54249c54111231f3e75f82dd7b7382  xpdf-2.02-9.3.ia64.rpm

x86_64:
a5a3d7385ddd6a097a28bbf61e0191c6  xpdf-2.02-9.3.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/xpdf-2.02-9.3.src.rpm
d5e0ad682a7e83311d5588ef25984329  xpdf-2.02-9.3.src.rpm

i386:
c62ccce8752958320f429b2f0275b583  xpdf-2.02-9.3.i386.rpm

ia64:
5e54249c54111231f3e75f82dd7b7382  xpdf-2.02-9.3.ia64.rpm

x86_64:
a5a3d7385ddd6a097a28bbf61e0191c6  xpdf-2.02-9.3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBf8DIXlSAg2UNWIIRAncGAJ0biFHxokhUBmgL9dOnbv6YeZ+8nQCfUHl3
cCBJdKfmyuhZwjnW71uK3Hg=
=ZONG
-----END PGP SIGNATURE-----





More information about the Enterprise-watch-list mailing list