A new update is available for Red Hat Enterprise Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Important: gpdf security update
Advisory ID: RHSA-2007:1025-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1025.html
Issue date: 2007-11-07
Updated on: 2007-11-07
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-4352 CVE-2007-5392 CVE-2007-5393
- ---------------------------------------------------------------------
1. Summary:
Updated gpdf packages that fix several security issues are now available
for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
gpdf is a GNOME-based viewer for Portable Document Format (PDF) files.
Alin Rad Pop discovered several flaws in the handling of PDF files. An
attacker could create a malicious PDF file that would cause gpdf to crash,
or potentially execute arbitrary code when opened.
(CVE-2007-4352, CVE-2007-5392, CVE-2007-5393)
Users are advised to upgrade to these updated packages, which contain
backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
345101 - CVE-2007-4352 xpdf memory corruption in DCTStream::readProgressiveDataUnit()
345111 - CVE-2007-5392 xpdf buffer overflow in DCTStream::reset()
345121 - CVE-2007-5393 xpdf buffer overflow in CCITTFaxStream::lookChar()
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gpdf-2.8.2-7.7.1.src.rpm
f4f7acbb9f48478834983b75d291de4d gpdf-2.8.2-7.7.1.src.rpm
i386:
1b72ecf4d50090e7545c891f79a27903 gpdf-2.8.2-7.7.1.i386.rpm
af1afe26edee84377625ba76a224aae8 gpdf-debuginfo-2.8.2-7.7.1.i386.rpm
ia64:
79a213a5e41a001b776f8d92284aa658 gpdf-2.8.2-7.7.1.ia64.rpm
d5cf5fd3e1345d9c5bda4bdcbfac1fa7 gpdf-debuginfo-2.8.2-7.7.1.ia64.rpm
ppc:
54b9638c6ec4dcf40e2ed9399a127c56 gpdf-2.8.2-7.7.1.ppc.rpm
92a06e76972699dcd242b24f30f56987 gpdf-debuginfo-2.8.2-7.7.1.ppc.rpm
s390:
8a4e50dc8f5adcda54a25813bba540c5 gpdf-2.8.2-7.7.1.s390.rpm
79a6de142fd15e34df673af511e6eafc gpdf-debuginfo-2.8.2-7.7.1.s390.rpm
s390x:
86f6acbeb9e3edc17002663f61666f69 gpdf-2.8.2-7.7.1.s390x.rpm
1e62bdfdd4b48024ca2265fa59678c76 gpdf-debuginfo-2.8.2-7.7.1.s390x.rpm
x86_64:
357b7239bf3a6d8fec64605cf2f067aa gpdf-2.8.2-7.7.1.x86_64.rpm
5d5ba42a3326876395e2adc9cdc449c5 gpdf-debuginfo-2.8.2-7.7.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gpdf-2.8.2-7.7.1.src.rpm
f4f7acbb9f48478834983b75d291de4d gpdf-2.8.2-7.7.1.src.rpm
i386:
1b72ecf4d50090e7545c891f79a27903 gpdf-2.8.2-7.7.1.i386.rpm
af1afe26edee84377625ba76a224aae8 gpdf-debuginfo-2.8.2-7.7.1.i386.rpm
x86_64:
357b7239bf3a6d8fec64605cf2f067aa gpdf-2.8.2-7.7.1.x86_64.rpm
5d5ba42a3326876395e2adc9cdc449c5 gpdf-debuginfo-2.8.2-7.7.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gpdf-2.8.2-7.7.1.src.rpm
f4f7acbb9f48478834983b75d291de4d gpdf-2.8.2-7.7.1.src.rpm
i386:
1b72ecf4d50090e7545c891f79a27903 gpdf-2.8.2-7.7.1.i386.rpm
af1afe26edee84377625ba76a224aae8 gpdf-debuginfo-2.8.2-7.7.1.i386.rpm
ia64:
79a213a5e41a001b776f8d92284aa658 gpdf-2.8.2-7.7.1.ia64.rpm
d5cf5fd3e1345d9c5bda4bdcbfac1fa7 gpdf-debuginfo-2.8.2-7.7.1.ia64.rpm
x86_64:
357b7239bf3a6d8fec64605cf2f067aa gpdf-2.8.2-7.7.1.x86_64.rpm
5d5ba42a3326876395e2adc9cdc449c5 gpdf-debuginfo-2.8.2-7.7.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gpdf-2.8.2-7.7.1.src.rpm
f4f7acbb9f48478834983b75d291de4d gpdf-2.8.2-7.7.1.src.rpm
i386:
1b72ecf4d50090e7545c891f79a27903 gpdf-2.8.2-7.7.1.i386.rpm
af1afe26edee84377625ba76a224aae8 gpdf-debuginfo-2.8.2-7.7.1.i386.rpm
ia64:
79a213a5e41a001b776f8d92284aa658 gpdf-2.8.2-7.7.1.ia64.rpm
d5cf5fd3e1345d9c5bda4bdcbfac1fa7 gpdf-debuginfo-2.8.2-7.7.1.ia64.rpm
x86_64:
357b7239bf3a6d8fec64605cf2f067aa gpdf-2.8.2-7.7.1.x86_64.rpm
5d5ba42a3326876395e2adc9cdc449c5 gpdf-debuginfo-2.8.2-7.7.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHMf7DXlSAg2UNWIIRAll5AJoDsgTuqzsUuEQKtTU3iJGHJUOc6ACglakm
XYL66Qo4/whybCH8/a8oCn4=
=upjV
-----END PGP SIGNATURE-----