Bug 137476

Summary: CAN-2004-0888 xpdf integer overflows
Product: [Fedora] Fedora Reporter: Josh Bressers <bressers>
Component: tetexAssignee: Jindrich Novy <jnovy>
Status: CLOSED ERRATA QA Contact: David Lawrence <dkl>
Severity: medium Docs Contact:
Priority: medium    
Version: 2CC: mjc, pknirsch
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20041021
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-03-18 09:35:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2004-10-28 18:35:01 UTC
During a source code audit, Chris Evans and others discovered a number
of integer overflow bugs that affected all versions of xpdf.  An
attacker could construct a carefully crafted PDF file that could cause
xpdf to crash or possibly execute arbitrary code when opened.

tetex contains an internal version of xpdf.

See bug 135393 for patches and demo pdf files.

We should make sure this gets fixed in FC3

Comment 1 Jindrich Novy 2004-10-29 13:28:38 UTC
Hello Josh,

I built tetex-2.0.2-22 some time ago with the patch to dist-fc4.
Should I release an erratum for FC2, FC3, RHEL2.1, RHEL3?

Comment 3 Mark J. Cox 2004-11-09 10:19:33 UTC
Errata needed for FC2 and FC3 to fix this

Comment 4 Jindrich Novy 2004-11-09 14:53:47 UTC
tetex-2.0.2-21.1 is now built for FC3
tetex-2.0.2-14FC2 is now built in FC2

both with the patched xpdf.

Comment 5 Mark J. Cox 2005-03-18 09:35:10 UTC
was pushed 2005-01-03