Bug 175109

Summary: CVE-2005-3193 xpdf issues (CVE-2005-3191 CVE-2005-3192 CVE-2005-3628)
Product: Red Hat Enterprise Linux 4 Reporter: Josh Bressers <bressers>
Component: tetexAssignee: Jindrich Novy <jnovy>
Status: CLOSED ERRATA QA Contact: David Lawrence <dkl>
Severity: medium Docs Contact:
Priority: medium    
Version: 4.0CC: pknirsch, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,reported=20051103,public=20051206
Fixed In Version: RHSA-2006-0160 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-01-19 17:34:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2005-12-06 17:55:24 UTC
+++ This bug was initially created as a clone of Bug #175089 +++

Derek Noonburg sent us a patch for xpdf to correct a number of security issues.
 This is due to be public 20051201.

An attacker could construct a carefully crafted PDF file that could cause Xpdf
to crash or possibly execute arbitrary code when opened. 

This issue affects RHEL3, RHEL3, RHEL2.1

-- Additional comment from mjc on 2005-11-22 03:42 EST --
Created an attachment (id=121332)
Proposed patch from Derek

Comment 1 Josh Bressers 2005-12-06 17:58:03 UTC
This issue also affects the tetex for RHEL2.1 and RHEL3

Comment 2 Josh Bressers 2005-12-06 18:57:01 UTC
Attachment 121940 [details] contains a more complete patch which was taken from our recent
xpdf update.

Comment 3 Jindrich Novy 2005-12-07 10:10:55 UTC
Patches are now applied in RHEL2.1, 3, 4 and packages are built.

Comment 8 Red Hat Bugzilla 2006-01-19 17:34:19 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2006-0160.html