iDEFENSE has reported a stack based buffer overflow in xpdf. The patch is here: ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch
This issue does not affect RHEL2.1
Created attachment 109745 [details] iDEFENSE advisory
The patch URL does not yet work. We don't have a patch from upstream yet. I'll update the bugs as soon as I know.
Lifting embargo.
it's now fixed in xpdf-2.02-9.5
The iDEFENSE advisory is here. http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities
Created attachment 110032 [details] Demo pdf that triggers this issue.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-059.html