Yellow Dog Linux Security Announcement -------------------------------------- Package: xpdf Issue Date: September 26, 2000 Update Date: September 26, 2000 Priority: high Advisory ID: YDU-20000926-2 1. Topic: Security problem in temporary file and malicious URL. 2. Problem: "There is a security problem when using tmpnam() and fopen(). in versions prior to 0.91. The problem is seen when a root user overwrites files where a symlink is created between the calls to tmpname() and fopen(). There is also a problem with URL-type links in PDF documents that contain quote characters which could also be used to execute arbitrary commands." (from Red Hat advisory) 3. Solution: a) Updating via yup... We suggest that you use the Yellow Dog Update Program (yup) to keep your system up-to-date. The following command will automatically retrieve and install the fixed version of xpdf onto your system: yup update xpdf b) Updating manually... The update can also be retrieved manually from our ftp site below along with the rpm command that should be used to install the update. ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/champion-1.2/ppc/RPMS/ xpdf-0.91-1.ppc.rpm rpm -Fvh xpdf-0.91-1.ppc.rpm 4. Verification MD5 checksum Package -------------------------------- ---------------------------- c5bd8412700db94e98abdf07b0804ca8 RPMS/xpdf-0.91-1.ppc.rpm 37a8894d1353da48cedd66391d5f0783 SRPMS/xpdf-0.91-1.src.rpm If you wish to verify that each package has not been corrupted or tampered with, examine the md5sum with the following command: rpm --checksig --nogpg filename 5. Misc. Terra Soft has setup a moderated mailing list where these security, bugfix, and package enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more information. For information regarding the usage of yup, the Yellow Dog Update Program, see http://http://www.yellowdoglinux.com/support/solutions/ydl_general/yup.shtml