+++ This bug was initially created as a clone of Bug #175109 +++ +++ This bug was initially created as a clone of Bug #175089 +++ Derek Noonburg sent us a patch for xpdf to correct a number of security issues. This is due to be public 20051201. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. -- Additional comment from mjc on 2005-11-22 03:42 EST -- Created an attachment (id=121332) Proposed patch from Derek This issue also affects FC3
Attachment 121940 [details] contains a more complete patch which was taken from our recent xpdf update.
Applied in FC3 and FC4. Packages are now built.
From User-Agent: XML-RPC tetex-3.0-7.FC4 has been pushed for FC4, which should resolve this issue. If these problems are still present in this version, then please make note of it in this bug report.
The patches for these issues are in attachment 122226 [details] and attachment 122227 [details]. The sooner we can have new packages rolled the better as the Christmas holiday is quickly approaching.
There aren't currently any reproducers for these issues. Please note that these issues affect xpdf, kdegraphics, cups, gpdf, tetex and poppler. Some cooperation will probably make things easier.
Josh, does the patch from Dirk Mueller also belong under the CVE-2005-3193 issues or is it something else?
It's part of the CVE-2005-3191, CVE-2005-3192, and CVE-2005-3193 fixes. The initial patch from upstream left a lot of room for broken pdf files to cause damage.