[<prev] [next>] [day] [month] [year] [list]
Message-ID: <440E1977.7070802@videotron.ca>
Date: Tue Mar 7 23:40:40 2006
From: marcdeslauriers at videotron.ca (Marc Deslauriers)
Subject: [FLSA-2006:176751] Updated gpdf package fixes
security issues
---------------------------------------------------------------------
Fedora Legacy Update Advisory
Synopsis: Updated gpdf package fixes security issues
Advisory ID: FLSA:176751
Issue date: 2006-03-07
Product: Fedora Core
Keywords: Bugfix
CVE Names: CVE-2005-2097 CVE-2005-3191 CVE-2005-3192
CVE-2005-3193 CVE-2005-3624 CVE-2005-3625
CVE-2005-3626 CVE-2005-3627 CVE-2005-3628
---------------------------------------------------------------------
---------------------------------------------------------------------
1. Topic:
An updated gpdf package that fixes several security issues is now
available.
The gpdf package is a GNOME based viewer for Portable Document Format
(PDF) files.
2. Relevant releases/architectures:
Fedora Core 1 - i386
Fedora Core 2 - i386
Fedora Core 3 - i386, x86_64
3. Problem description:
A flaw was discovered in gpdf. An attacker could construct a carefully
crafted PDF file that would cause gpdf to consume all available disk
space in /tmp when opened. The Common Vulnerabilities and Exposures
project assigned the name CVE-2005-2097 to this issue.
Several flaws were discovered in gpdf. An attacker could construct a
carefully crafted PDF file that could cause gpdf to crash or possibly
execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project assigned the names CVE-2005-3191, CVE-2005-3192,
CVE-2005-3193, CVE-2005-3624, CVE-2005-3625, CVE-2005-3626,
CVE-2005-3627 and CVE-2005-3628 to these issues.
Users of gpdf should upgrade to this updated package, which contains
backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which
are not installed but included in the list will not be updated. Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.
Please note that this update is also available via yum and apt. Many
people find this an easier way to apply updates. To use yum issue:
yum update
or to use apt:
apt-get update; apt-get upgrade
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system. This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.
5. Bug IDs fixed:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=176751
6. RPMs required:
Fedora Core 1:
SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/gpdf-0.110-1.5.legacy.src.rpm
i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/gpdf-0.110-1.5.legacy.i386.rpm
Fedora Core 2:
SRPM:
http://download.fedoralegacy.org/fedora/2/updates/SRPMS/gpdf-2.8.2-4.1.1.legacy.src.rpm
i386:
http://download.fedoralegacy.org/fedora/2/updates/i386/gpdf-2.8.2-4.1.1.legacy.i386.rpm
Fedora Core 3:
SRPM:
http://download.fedoralegacy.org/fedora/3/updates/SRPMS/gpdf-2.8.2-7.2.1.legacy.src.rpm
i386:
http://download.fedoralegacy.org/fedora/3/updates/i386/gpdf-2.8.2-7.2.1.legacy.i386.rpm
x86_64:
http://download.fedoralegacy.org/fedora/3/updates/x86_64/gpdf-2.8.2-7.2.1.legacy.x86_64.rpm
7. Verification:
SHA1 sum Package Name
---------------------------------------------------------------------
646edd9bdaf07a2f74d0b9874a666f94dc4f7982
fedora/1/updates-testing/i386/gpdf-0.110-1.5.legacy.i386.rpm
23f1172453f4e6572bd5a5bebcf093fda9c9ef62
fedora/1/updates-testing/SRPMS/gpdf-0.110-1.5.legacy.src.rpm
2798a8e5ba37214b4ad3d537aa38b65c62c9e7c7
fedora/2/updates-testing/i386/gpdf-2.8.2-4.1.1.legacy.i386.rpm
e6d36329145bd25d5646da0064124f4b3a3faf99
fedora/2/updates-testing/SRPMS/gpdf-2.8.2-4.1.1.legacy.src.rpm
2a08ad7afb9cecc7e41d80603a536b191d85f776
fedora/3/updates-testing/i386/gpdf-2.8.2-7.2.1.legacy.i386.rpm
3d3ab23bea79b424aaac1c26e3c16a3dfbee7af0
fedora/3/updates-testing/SRPMS/gpdf-2.8.2-7.2.1.legacy.src.rpm
a434ff117af22aeacc3c76773fa6985be9c107c0
fedora/3/updates-testing/x86_64/gpdf-2.8.2-7.2.1.legacy.x86_64.rpm
These packages are GPG signed by Fedora Legacy for security. Our key is
available from http://www.fedoralegacy.org/about/security.php
You can verify each package with the following command:
rpm --checksig -v <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:
sha1sum <filename>
8. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628
9. Contact:
The Fedora Legacy security contact is <secnotice@...oralegacy.org>. More
project details at http://www.fedoralegacy.org
---------------------------------------------------------------------
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 191 bytes
Desc: OpenPGP digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060307/e2626775/signature.bin
Powered by blists - more mailing lists