rPath Security Advisory: 2008-0223-1
rPath Linux 2
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
rPath Issue Tracking System:
Previous versions of the poppler package contain a memory-management
bug that may allow user-assisted attackers to execute arbitrary code
using maliciously crafted PDF files.
Note that applications linked against libpoppler may also be affected
by this vulnerability, and will be fixed by this update.
Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html