Home > Security > Advisories

Advisories

Mandriva Advisories

Package name xpdf
Date August 11th, 2005
Advisory ID MDKSA-2005:134
Affected versions 10.1, CS3.0, 10.2
Synopsis Updated xpdf packages fix vulnerability

Problem Description

A vulnerability in the xpdf PDF viewer was discovered. An attacker
could construct a malicious PDF file that would cause xpdf to consume
all available disk space in /tmp when opened.

The updated packages have been patched to correct this problem.

Updated Packages

Mandrakelinux 10.1

 7f4f100067cd672f016516b194909e43  10.1/RPMS/xpdf-3.00-7.5.101mdk.i586.rpm
7368fa33facb2083cd26a6ef3a799948  10.1/SRPMS/xpdf-3.00-7.5.101mdk.src.rpm

Mandrakelinux 10.1/X86_64

 56cadb3d47e6710952de1049ce13fab1  x86_64/10.1/RPMS/xpdf-3.00-7.5.101mdk.x86_64.rpm
7368fa33facb2083cd26a6ef3a799948  x86_64/10.1/SRPMS/xpdf-3.00-7.5.101mdk.src.rpm

Corporate Server 3.0

 c45e030af9055bcfc3ccd6c38ee6e226  corporate/3.0/RPMS/xpdf-3.00-5.6.C30mdk.i586.rpm
064e874426edf0ae682a663fd808dcb4  corporate/3.0/SRPMS/xpdf-3.00-5.6.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 78a63c78dcf717ef6a35fbbd554d7a19  x86_64/corporate/3.0/RPMS/xpdf-3.00-5.6.C30mdk.x86_64.rpm
064e874426edf0ae682a663fd808dcb4  x86_64/corporate/3.0/SRPMS/xpdf-3.00-5.6.C30mdk.src.rpm

Mandriva Linux LE2005

 787175ff7706f5ab401b3513d083c837  10.2/RPMS/xpdf-3.00pl3-6.1.102mdk.i586.rpm
10a6b76595cef0a8ab5c6bf7192a095f  10.2/SRPMS/xpdf-3.00pl3-6.1.102mdk.src.rpm

Mandriva Linux LE2005/X86_64

 45ad909c03b59b466dc1b87f822fba00  x86_64/10.2/RPMS/xpdf-3.00pl3-6.1.102mdk.x86_64.rpm
10a6b76595cef0a8ab5c6bf7192a095f  x86_64/10.2/SRPMS/xpdf-3.00pl3-6.1.102mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.