Bug 175102 - CVE-2005-3193 xpdf issues (CVE-2005-3191 CVE-2005-3192)
Summary: CVE-2005-3193 xpdf issues (CVE-2005-3191 CVE-2005-3192)
Alias: None
Product: Fedora
Classification: Fedora
Component: gpdf
Version: 3
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Ray Strode [halfline]
QA Contact:
Whiteboard: impact=important,reported=20051103,pu...
Keywords: Security
Depends On:
TreeView+ depends on / blocked
Reported: 2005-12-06 17:43 UTC by Josh Bressers
Modified: 2007-11-30 22:11 UTC (History)
1 user (show)

Clone Of:
Last Closed: 2005-12-15 18:18:29 UTC

Attachments (Terms of Use)

Description Josh Bressers 2005-12-06 17:43:06 UTC
+++ This bug was initially created as a clone of Bug #175100 +++

Derek Noonburg sent us a patch for xpdf to correct a number of security issues.
 This is due to be public 20051201.

An attacker could construct a carefully crafted PDF file that could cause Xpdf
to crash or possibly execute arbitrary code when opened. 

This issue affects RHEL3, RHEL3, RHEL2.1

-- Additional comment from mjc@redhat.com on 2005-11-22 03:42 EST --
Created an attachment (id=121332)
Proposed patch from Derek

Comment 1 Josh Bressers 2005-12-06 18:56:33 UTC
Attachment 121940 [details] contains a more complete patch which was taken from our recent
xpdf update.

Comment 2 Josh Bressers 2005-12-14 15:30:13 UTC
The patches for these issues are in attachment 122226 [details] and attachment 122227 [details].

The sooner we can have new packages rolled the better as the Christmas holiday
is quickly approaching.

Comment 3 Josh Bressers 2005-12-14 16:13:02 UTC
There aren't currently any reproducers for these issues.

Please note that these issues affect xpdf, kdegraphics, cups, gpdf, tetex and
poppler.  Some cooperation will probably make things easier.

Comment 4 Fedora Update System 2005-12-15 01:54:00 UTC
From User-Agent: XML-RPC

gpdf-2.8.2-6.2 has been pushed for FC3, which should resolve this issue.  If these problems are still present in this version, then please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.