RedHat: Important: gpdf security update RHSA-2005:057-01
Summary
Summary
GPdf is a viewer for Portable Document Format (PDF) files for GNOME. A buffer overflow flaw was found in the Gfx::doImage function of Xpdf which also affects GPdf due to a shared codebase. An attacker could construct a carefully crafted PDF file that could cause GPdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1125 to this issue. A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of Xpdf which also affects GPdf due to a shared codebase. An attacker could construct a carefully crafted PDF file that could cause GPdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0064 to this issue. During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of Xpdf, which also affects GPdf due to a shared codebase. An attacker could construct a carefully crafted PDF file that could cause GPdf to crash or possibly execute arbitrary code when opened. This issue was assigned the name CAN-2004-0888 by The Common Vulnerabilities and Exposures project (cve.mitre.org). Red Hat Enterprise Linux 4 contained a fix for this issue, but it was found to be incomplete and left 64-bit architectures vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0206 to this issue. Users should update to this erratum package which contains backported patches to correct these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
144210 - CAN-2004-1125 gpdf buffer overflow
145054 - CAN-2005-0064 xpdf buffer overflow
147518 - CAN-2004-0888 xpdf integer overflows
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
0d2d40d1e98b5e2ecbebabf18f4941f7 gpdf-2.8.2-4.3.src.rpm
i386:
bd095233bada6a9596cc0a27a88c3991 gpdf-2.8.2-4.3.i386.rpm
ia64:
e8ad37d8c0c724526af8d0d59f7bc8e3 gpdf-2.8.2-4.3.ia64.rpm
ppc:
226b1a316072a0aa69e9c8729a8a37ed gpdf-2.8.2-4.3.ppc.rpm
s390:
7945af0b72f4ddc8942d00a8b279fc1c gpdf-2.8.2-4.3.s390.rpm
s390x:
18935e86dc836057e5bc7bb0da86d281 gpdf-2.8.2-4.3.s390x.rpm
x86_64:
7438f03d85d8e28d180fa4aebc16e624 gpdf-2.8.2-4.3.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
0d2d40d1e98b5e2ecbebabf18f4941f7 gpdf-2.8.2-4.3.src.rpm
i386:
bd095233bada6a9596cc0a27a88c3991 gpdf-2.8.2-4.3.i386.rpm
x86_64:
7438f03d85d8e28d180fa4aebc16e624 gpdf-2.8.2-4.3.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
0d2d40d1e98b5e2ecbebabf18f4941f7 gpdf-2.8.2-4.3.src.rpm
i386:
bd095233bada6a9596cc0a27a88c3991 gpdf-2.8.2-4.3.i386.rpm
ia64:
e8ad37d8c0c724526af8d0d59f7bc8e3 gpdf-2.8.2-4.3.ia64.rpm
x86_64:
7438f03d85d8e28d180fa4aebc16e624 gpdf-2.8.2-4.3.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
0d2d40d1e98b5e2ecbebabf18f4941f7 gpdf-2.8.2-4.3.src.rpm
i386:
bd095233bada6a9596cc0a27a88c3991 gpdf-2.8.2-4.3.i386.rpm
ia64:
e8ad37d8c0c724526af8d0d59f7bc8e3 gpdf-2.8.2-4.3.ia64.rpm
x86_64:
7438f03d85d8e28d180fa4aebc16e624 gpdf-2.8.2-4.3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0206
Package List
Topic
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Bugs Fixed