blob: caee5f43377d0fe8017ae161e810a759e7007a1b [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200602-12">
<title>GPdf: heap overflows in included Xpdf code</title>
GPdf includes vulnerable Xpdf code to handle PDF files, making it
vulnerable to the execution of arbitrary code.
<product type="ebuild">gpdf</product>
<announced>February 21, 2006</announced>
<revised>February 21, 2006: 01</revised>
<package name="app-text/gpdf" auto="yes" arch="*">
<unaffected range="ge">2.10.0-r4</unaffected>
<vulnerable range="lt">2.10.0-r4</vulnerable>
GPdf is a Gnome PDF viewer.
Dirk Mueller found a heap overflow vulnerability in the XPdf
codebase when handling splash images that exceed size of the associated
<impact type="normal">
An attacker could entice a user to open a specially crafted PDF
file with GPdf, potentially resulting in the execution of arbitrary
code with the rights of the user running the affected application.
There is no known workaround at this time.
All GPdf users should upgrade to the latest version.
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.10.0-r4&quot;</code>
<uri link="">CVE-2006-0301</uri>
<metadata tag="requester" timestamp="Thu, 16 Feb 2006 20:47:35 +0000">
<metadata tag="bugReady" timestamp="Fri, 17 Feb 2006 21:40:10 +0000">
<metadata tag="submitter" timestamp="Fri, 17 Feb 2006 23:04:04 +0000">