Debian: New gpdf packages fix denial of service

    Date02 Aug 2006
    CategoryDebian
    3545
    Posted ByLinuxSecurity Advisories
    "infamous41md" and Chris Evans discovered several heap based buffer overflows in xpdf, the Portable Document Format (PDF) suite, which are also present in gpdf, the viewer with Gtk bindings, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1136-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Martin Schulze
    August 2nd, 2006                        http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : gpdf
    Vulnerability  : wrong input sanitising
    Problem type   : local (remote)
    Debian-specific: no
    CVE ID         : CVE-2005-2097
    BugTraq ID     : 14529
    Debian Bug     : 334454
    
    "infamous41md" and Chris Evans discovered several heap based buffer
    overflows in xpdf, the Portable Document Format (PDF) suite, which are
    also present in gpdf, the viewer with Gtk bindings, and which can lead
    to a denial of service by crashing the application or possibly to the
    execution of arbitrary code.
    
    For the stable distribution (sarge) these problems have been fixed in
    version 2.8.2-1.2sarge5.
    
    For the unstable distribution (sid) these problems have been fixed in
    version 2.10.0-4.
    
    We recommend that you upgrade your gpdf package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given at the end of this advisory:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5.dsc
          Size/MD5 checksum:     1663 d7cd341afa44a55b1d6b6e177506df73
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5.diff.gz
          Size/MD5 checksum:    37001 4c0f08229d68b89376f1dafbd2785602
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2.orig.tar.gz
          Size/MD5 checksum:  1245535 5ceb66aa95e51c4e1d6e10cb29560ff9
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_alpha.deb
          Size/MD5 checksum:   868192 a1165a52e231ad0d7288956259f6dac1
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_amd64.deb
          Size/MD5 checksum:   795826 b77396935f929046e71688cf6c803718
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_arm.deb
          Size/MD5 checksum:   781744 4bd8fcb7aa0e8d8073f9c834f492273e
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_i386.deb
          Size/MD5 checksum:   782022 6e3c2f14a9f79a0fa8d6c7146329cf55
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_ia64.deb
          Size/MD5 checksum:   958464 f60ab132197b6451be37e95c7b0802f6
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_hppa.deb
          Size/MD5 checksum:   859960 52fc5ab1c1c7b0a337093196d08076af
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_m68k.deb
          Size/MD5 checksum:   746044 07af12e76e683943d028347673b325dc
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_mips.deb
          Size/MD5 checksum:   818708 789e70f91a8b43909790389833f5c2f9
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_mipsel.deb
          Size/MD5 checksum:   811194 6f27ce39b1d79d49992ae66e6fc45b13
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_powerpc.deb
          Size/MD5 checksum:   799932 f7f6e5df3d35a4e24ef714a02300bb89
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_s390.deb
          Size/MD5 checksum:   776202 0c511feed7677d69e5e9b901239c25e0
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/g/gpdf/gpdf_2.8.2-1.2sarge5_sparc.deb
          Size/MD5 checksum:   763980 90c9205b4bc9b61b46d8d46c09e74b83
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"40","type":"x","order":"1","pct":48.78,"resources":[]},{"id":"88","title":"Should be more technical","votes":"13","type":"x","order":"2","pct":15.85,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"29","type":"x","order":"3","pct":35.37,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.