Fedora Core 3 Update: gpdf-2.8.2-7.2

    Date27 Jan 2006
    CategoryFedora
    4299
    Posted ByJoe Shakespeare
    Chris Evans discovered several flaws in the way CUPS processes PDF files. An attacker could construct a carefully crafted PDF file that could cause CUPS to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the names CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, and CVE-2005-3627 to these issues.
    ---------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2005-025
    2006-01-10
    ---------------------------------------------------------------------
    
    Product     : Fedora Core 3
    Name        : gpdf
    Version     : 2.8.2                      
    Release     : 7.2                  
    Summary     : viewer for Portable Document Format (PDF) files for GNOME
    Description :
    This is GPdf, a viewer for Portable Document Format (PDF) files for
    GNOME. GPdf is based on the Xpdf program and uses additional GNOME
    libraries for better desktop integration.
    
    GPdf includes the gpdf application, a Bonobo control for PDF display
    which can be embedded in Nautilus, and a Nautilus property page for
    PDF files.
    
    ---------------------------------------------------------------------
    Update Information:
    
    Chris Evans discovered several flaws in the way CUPS
    processes PDF files. An attacker could construct a carefully
    crafted PDF file that could cause CUPS to crash or possibly
    execute arbitrary code when opened. The Common
    Vulnerabilities and Exposures project assigned the names
    CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, and
    CVE-2005-3627 to these issues.
    
    ---------------------------------------------------------------------
    * Tue Jan 10 2006 Ray Strode  2.8.2-7.2
    - Apply fix for CVE-2005-3624 (also covers CVE-2005-3193) 
      (bug 176866)
    
    
    ---------------------------------------------------------------------
    This update can be downloaded from:
      http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
    
    3f7a8f70d4f2a8f18d823c572ad99755361adf23  SRPMS/gpdf-2.8.2-7.2.src.rpm
    e0b1860bc92e3b69c60dbe53548ca709223d1822  x86_64/gpdf-2.8.2-7.2.x86_64.rpm
    42a7a344a3d3e040bf37e002c788f8ca5fde8dba  x86_64/debug/gpdf-debuginfo-2.8.2-7.2.x86_64.rpm
    cada2bbc6925dbb27ea17317f9f8c31488d33cd0  i386/gpdf-2.8.2-7.2.i386.rpm
    9280b56de65f4acedd3c13b5ff455fdc610463ae  i386/debug/gpdf-debuginfo-2.8.2-7.2.i386.rpm
    
    This update can also be installed with the Update Agent; you can
    launch the Update Agent with the 'up2date' command.  
    ---------------------------------------------------------------------
    
    -- 
    fedora-announce-list mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/fedora-announce-list
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"65","type":"x","order":"1","pct":57.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.2,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.