+++ This bug was initially created as a clone of Bug #175109 +++
+++ This bug was initially created as a clone of Bug #175089 +++
Derek Noonburg sent us a patch for xpdf to correct a number of security issues.
This is due to be public 20051201.
An attacker could construct a carefully crafted PDF file that could cause Xpdf
to crash or possibly execute arbitrary code when opened.
-- Additional comment from firstname.lastname@example.org on 2005-11-22 03:42 EST --
Created an attachment (id=121332)
Proposed patch from Derek
This issue also affects FC3
Attachment 121940 [details] contains a more complete patch which was taken from our recent
Applied in FC3 and FC4. Packages are now built.
From User-Agent: XML-RPC
tetex-3.0-7.FC4 has been pushed for FC4, which should resolve this issue. If these problems are still present in this version, then please make note of it in this bug report.
The patches for these issues are in attachment 122226 [details] and attachment 122227 [details].
The sooner we can have new packages rolled the better as the Christmas holiday
is quickly approaching.
There aren't currently any reproducers for these issues.
Please note that these issues affect xpdf, kdegraphics, cups, gpdf, tetex and
poppler. Some cooperation will probably make things easier.
Josh, does the patch from Dirk Mueller also belong under the CVE-2005-3193
issues or is it something else?
It's part of the CVE-2005-3191, CVE-2005-3192, and CVE-2005-3193 fixes. The
initial patch from upstream left a lot of room for broken pdf files to cause damage.