Home > Security > Advisories

Advisories

Mandriva Advisories

Package name gpdf
Date August 13th, 2007
Advisory ID MDKSA-2007:159
Affected versions CS3.0
Synopsis Updated gpdf packages fix vulnerability

Problem Description

Maurycy Prodeus found an integer overflow vulnerability in the way
various PDF viewers processed PDF files. An attacker could create
a malicious PDF file that could cause gpdf to crash and possibly
execute arbitrary code open a user opening the file.

This update provides packages which are patched to prevent these
issues.

Updated Packages

Corporate Server 3.0

 4cd42c64b35c4eccdcb85de2a0889876  corporate/3.0/i586/gpdf-0.112-2.8.C30mdk.i586.rpm 
 5eaf44a638c77c2b6b9f99c81a8bd00a  corporate/3.0/SRPMS/gpdf-0.112-2.8.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 a994aae5759655c0b8dffa064c5f83a8  corporate/3.0/x86_64/gpdf-0.112-2.8.C30mdk.x86_64.rpm 
 5eaf44a638c77c2b6b9f99c81a8bd00a  corporate/3.0/SRPMS/gpdf-0.112-2.8.C30mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.