[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1JmfqW-0006HK-FP@titan.mandriva.com>
Date: Thu, 17 Apr 2008 19:57:00 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2008:089 ] - Updated poppler packages fix vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:089
http://www.mandriva.com/security/
_______________________________________________________________________
Package : poppler
Date : April 17, 2008
Affected: Corporate 4.0
_______________________________________________________________________
Problem Description:
Kees Cook of Ubuntu security found a flaw in how poppler prior
to version 0.6 displayed malformed fonts embedded in PDF files.
An attacker could create a malicious PDF file that would cause
applications using poppler to crash, or possibly execute arbitrary
code when opened (CVE-2008-1693).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693
_______________________________________________________________________
Updated Packages:
Corporate 4.0:
4701915c12ecf895dcb4772a31d1deca corporate/4.0/i586/libpoppler0-0.4.1-3.7.20060mlcs4.i586.rpm
c36f50db21bdb368aadfcb518c1309e6 corporate/4.0/i586/libpoppler0-devel-0.4.1-3.7.20060mlcs4.i586.rpm
0e79560be87df742afeaae41956d075a corporate/4.0/i586/libpoppler-qt0-0.4.1-3.7.20060mlcs4.i586.rpm
c4dc210352c366f877372ebb941a9ed2 corporate/4.0/i586/libpoppler-qt0-devel-0.4.1-3.7.20060mlcs4.i586.rpm
a0835933cb055b6ed7b7d7bbe8de0d06 corporate/4.0/SRPMS/poppler-0.4.1-3.7.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
10f7767b01ec173c2c7ad69ec7ba1fb1 corporate/4.0/x86_64/lib64poppler0-0.4.1-3.7.20060mlcs4.x86_64.rpm
47a486fbf806c84175cbb101ef86a2e9 corporate/4.0/x86_64/lib64poppler0-devel-0.4.1-3.7.20060mlcs4.x86_64.rpm
d206062518205787f3938681d401c543 corporate/4.0/x86_64/lib64poppler-qt0-0.4.1-3.7.20060mlcs4.x86_64.rpm
9954016767660f2cdc85ba6a10346dcb corporate/4.0/x86_64/lib64poppler-qt0-devel-0.4.1-3.7.20060mlcs4.x86_64.rpm
a0835933cb055b6ed7b7d7bbe8de0d06 corporate/4.0/SRPMS/poppler-0.4.1-3.7.20060mlcs4.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIB9WumqjQ0CJFipgRApjuAJ4wKniF15dS/Xiao16L2rP7joThiACgkQK+
oL+++bKTKDIC0pZo9y9Cnwk=
=g9ap
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists