+++ This bug was initially created as a clone of Bug #175100 +++
Derek Noonburg sent us a patch for xpdf to correct a number of security issues.
This is due to be public 20051201.
An attacker could construct a carefully crafted PDF file that could cause Xpdf
to crash or possibly execute arbitrary code when opened.
This issue affects RHEL3, RHEL3, RHEL2.1
-- Additional comment from email@example.com on 2005-11-22 03:42 EST --
Created an attachment (id=121332)
Proposed patch from Derek
Attachment 121940 [details] contains a more complete patch which was taken from our recent
The patches for these issues are in attachment 122226 [details] and attachment 122227 [details].
The sooner we can have new packages rolled the better as the Christmas holiday
is quickly approaching.
There aren't currently any reproducers for these issues.
Please note that these issues affect xpdf, kdegraphics, cups, gpdf, tetex and
poppler. Some cooperation will probably make things easier.
From User-Agent: XML-RPC
gpdf-2.8.2-6.2 has been pushed for FC3, which should resolve this issue. If these problems are still present in this version, then please make note of it in this bug report.