Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in xpdf
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in xpdf
ID: MDKSA-2007:219
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva Corporate 4.0, Mandriva 2007.1, Mandriva 2008.0
Datum: Do, 15. November 2007, 22:12
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
Applikationen: xpdf

Originalnachricht

This is a multi-part message in MIME format...

------------=_1195161157-4794-3653


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:219
http://www.mandriva.com/security/
_______________________________________________________________________

Package : xpdf
Date : November 15, 2007
Affected: 2007.1, 2008.0, Corporate 3.0, Corporate 4.0
_______________________________________________________________________

Problem Description:

Alin Rad Pop found several flaws in how PDF files are handled in xpdf.
An attacker could create a malicious PDF file that would cause xpdf
to crash or potentially execute arbitrary code when opened.

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
84beae3df3a7d401436830b6f2a674a4 2007.1/i586/xpdf-3.02-1.3mdv2007.1.i586.rpm
4d8e70228832c64e7f3918366af039f9
2007.1/i586/xpdf-tools-3.02-1.3mdv2007.1.i586.rpm
367f5f2af7a42a5d8f12f6be791c43a6 2007.1/SRPMS/xpdf-3.02-1.3mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
7f3cbb53f9f1cc6c3d870087f8b41fd7
2007.1/x86_64/xpdf-3.02-1.3mdv2007.1.x86_64.rpm
d585f49400a9e535624dc4fd901ededc
2007.1/x86_64/xpdf-tools-3.02-1.3mdv2007.1.x86_64.rpm
367f5f2af7a42a5d8f12f6be791c43a6 2007.1/SRPMS/xpdf-3.02-1.3mdv2007.1.src.rpm

Mandriva Linux 2008.0:
53a9655e26057cefad52fc64f522476a 2008.0/i586/xpdf-3.02-8.1mdv2008.0.i586.rpm
8bac2df1a50f44e9ae2fcc1d79925921
2008.0/i586/xpdf-common-3.02-8.1mdv2008.0.i586.rpm
3fadcbe185699666c3e5e04d0e9829d2
2008.0/i586/xpdf-tools-3.02-8.1mdv2008.0.i586.rpm
f742203205a23da363628822fb68c89b 2008.0/SRPMS/xpdf-3.02-8.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
7c26280a3afa5ee7642e4b349248f84a
2008.0/x86_64/xpdf-3.02-8.1mdv2008.0.x86_64.rpm
82d23a665b490187655c9d56645a3dac
2008.0/x86_64/xpdf-common-3.02-8.1mdv2008.0.x86_64.rpm
a87a083a3e325de5932d12eb9279afb4
2008.0/x86_64/xpdf-tools-3.02-8.1mdv2008.0.x86_64.rpm
f742203205a23da363628822fb68c89b 2008.0/SRPMS/xpdf-3.02-8.1mdv2008.0.src.rpm

Corporate 3.0:
0d6fc02962af59126e8555a9ceee1232
corporate/3.0/i586/xpdf-3.02-0.1.C30mdk.i586.rpm
805158fdda5e8503ab82b284d9713a80
corporate/3.0/i586/xpdf-tools-3.02-0.1.C30mdk.i586.rpm
d8e06ac57ee49969bafaea2aab61362b
corporate/3.0/SRPMS/xpdf-3.02-0.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
2ee284bb47436d10dc76f17c83ed9a0b
corporate/3.0/x86_64/xpdf-3.02-0.1.C30mdk.x86_64.rpm
81821c76942a3bdcee9a0c9898f22417
corporate/3.0/x86_64/xpdf-tools-3.02-0.1.C30mdk.x86_64.rpm
d8e06ac57ee49969bafaea2aab61362b
corporate/3.0/SRPMS/xpdf-3.02-0.1.C30mdk.src.rpm

Corporate 4.0:
6f9bbe3195219b867fa39c12905809a2
corporate/4.0/i586/xpdf-3.02-0.1.20060mlcs4.i586.rpm
0fd83b6a5f1b16f45ee94230d89159e3
corporate/4.0/i586/xpdf-tools-3.02-0.1.20060mlcs4.i586.rpm
5f75c600f427467d1c30caad8d089c25
corporate/4.0/SRPMS/xpdf-3.02-0.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
0d9c422f269476c2f155b5074e3aa21d
corporate/4.0/x86_64/xpdf-3.02-0.1.20060mlcs4.x86_64.rpm
91ff8618aa404e61f086f744e23f1ee2
corporate/4.0/x86_64/xpdf-tools-3.02-0.1.20060mlcs4.x86_64.rpm
5f75c600f427467d1c30caad8d089c25
corporate/4.0/SRPMS/xpdf-3.02-0.1.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHPI4CmqjQ0CJFipgRAhfyAKC1QBtzO93qXXMS4cheBRDI1oz4tgCgizX4
HhYUS2bOUQhAnUanA1vEdnM=
=POMZ
-----END PGP SIGNATURE-----


------------=_1195161157-4794-3653
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1195161157-4794-3653--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung