A xpdf security update has been released for Red Hat Enterprise Linux 4
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Important: xpdf security update
Advisory ID: RHSA-2005:034-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-034.html
Issue date: 2005-02-15
Updated on: 2005-02-15
Product: Red Hat Enterprise Linux
CVE Names: CAN-2004-1125 CAN-2005-0064 CAN-2005-0206
----------------------------------------------------------------------
1. Summary:
An updated xpdf package that fixes several security issues is now available.
This update has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
Xpdf is an X Window System based viewer for Portable Document Format (PDF) files.
A buffer overflow flaw was found in the Gfx::doImage function of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1125 to this issue.
A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0064 to this issue.
During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. This issue was assigned the name CAN-2004-0888 by The Common Vulnerabilities and Exposures project (cve.mitre.org). Red Hat Enterprise Linux 4 contained a fix for this issue, but it was found to be incomplete and left 64-bit architectures vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0206 to this issue.
All users of Xpdf should upgrade to this updated package, which contains backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
135066 - PDF is displayed garbled, older xpdf works
144197 - CAN-2004-1125 xpdf buffer overflow
145052 - CAN-2005-0064 xpdf buffer overflow
147498 - CAN-2004-0888 xpdf integer overflows
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
ia64:
13c4121b81b9f23823a1520bbbe32dc2 xpdf-3.00-11.5.ia64.rpm
ppc:
718b4a6f293d7ce1f86beef56045e1ce xpdf-3.00-11.5.ppc.rpm
s390:
c71bcd78d9b3b2809e352c2fb9ec41e9 xpdf-3.00-11.5.s390.rpm
s390x:
0a6fa78e35440fea22fe15a4dd6f8d77 xpdf-3.00-11.5.s390x.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
ia64:
13c4121b81b9f23823a1520bbbe32dc2 xpdf-3.00-11.5.ia64.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
ia64:
13c4121b81b9f23823a1520bbbe32dc2 xpdf-3.00-11.5.ia64.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0206
8. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc.
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Important: xpdf security update
Advisory ID: RHSA-2005:034-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-034.html
Issue date: 2005-02-15
Updated on: 2005-02-15
Product: Red Hat Enterprise Linux
CVE Names: CAN-2004-1125 CAN-2005-0064 CAN-2005-0206
----------------------------------------------------------------------
1. Summary:
An updated xpdf package that fixes several security issues is now available.
This update has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
Xpdf is an X Window System based viewer for Portable Document Format (PDF) files.
A buffer overflow flaw was found in the Gfx::doImage function of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1125 to this issue.
A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0064 to this issue.
During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. This issue was assigned the name CAN-2004-0888 by The Common Vulnerabilities and Exposures project (cve.mitre.org). Red Hat Enterprise Linux 4 contained a fix for this issue, but it was found to be incomplete and left 64-bit architectures vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0206 to this issue.
All users of Xpdf should upgrade to this updated package, which contains backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
135066 - PDF is displayed garbled, older xpdf works
144197 - CAN-2004-1125 xpdf buffer overflow
145052 - CAN-2005-0064 xpdf buffer overflow
147498 - CAN-2004-0888 xpdf integer overflows
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
ia64:
13c4121b81b9f23823a1520bbbe32dc2 xpdf-3.00-11.5.ia64.rpm
ppc:
718b4a6f293d7ce1f86beef56045e1ce xpdf-3.00-11.5.ppc.rpm
s390:
c71bcd78d9b3b2809e352c2fb9ec41e9 xpdf-3.00-11.5.s390.rpm
s390x:
0a6fa78e35440fea22fe15a4dd6f8d77 xpdf-3.00-11.5.s390x.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
ia64:
13c4121b81b9f23823a1520bbbe32dc2 xpdf-3.00-11.5.ia64.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
ia64:
13c4121b81b9f23823a1520bbbe32dc2 xpdf-3.00-11.5.ia64.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0206
8. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc.