Mandriva Update for xpdf MDVSA-2010:228 (xpdf)

Solution
Please Install the Updated Packages.
Insight
Multiple vulnerabilities were discovered and corrected in xpdf: The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference (CVE-2010-3702). The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted Type1 font that contains a negative array index, which bypasses input validation and which triggers memory corruption (CVE-2010-3704). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&amp products_id=490 The updated packages have been patched to correct these issues.
Affected
xpdf on Mandriva Linux 2009.0, Mandriva Linux 2009.0/X86_64