Advisories
Mandriva Advisories
|
![]() |
Problem Description |
Maurycy Prodeus found an integer overflow vulnerability in the way
various PDF viewers processed PDF files. An attacker could create
a malicious PDF file that could cause gpdf to crash and possibly
execute arbitrary code open a user opening the file.
This update provides packages which are patched to prevent these
issues.
Updated Packages |
Corporate Server 3.0
4cd42c64b35c4eccdcb85de2a0889876 corporate/3.0/i586/gpdf-0.112-2.8.C30mdk.i586.rpm 5eaf44a638c77c2b6b9f99c81a8bd00a corporate/3.0/SRPMS/gpdf-0.112-2.8.C30mdk.src.rpm
Corporate Server 3.0/X86_64
a994aae5759655c0b8dffa064c5f83a8 corporate/3.0/x86_64/gpdf-0.112-2.8.C30mdk.x86_64.rpm 5eaf44a638c77c2b6b9f99c81a8bd00a corporate/3.0/SRPMS/gpdf-0.112-2.8.C30mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.