[ubuntu/hardy-security] poppler (delayed), poppler 0.6.4-1ubuntu3.5 (Accepted)

Ubuntu Installer archive at ubuntu.com
Tue Oct 19 14:04:36 BST 2010


poppler (0.6.4-1ubuntu3.5) hardy-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
    - debian/patches/108_security_CVE-2010-3702.patch: properly initialize
      parser in poppler/Gfx.cc.
    - CVE-2010-3702
  * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
    - debian/patches/109_security_CVE-2010-3704.patch: make sure code isn't
      < 0 in fofi/FoFiType1.cc.
    - CVE-2010-3704

Date: Wed, 13 Oct 2010 16:40:32 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/hardy/+source/poppler/0.6.4-1ubuntu3.5
-------------- next part --------------
Format: 1.7
Date: Wed, 13 Oct 2010 16:40:32 -0400
Source: poppler
Binary: libpoppler2 libpoppler-dev libpoppler-glib2 libpoppler-glib-dev libpoppler-qt2 libpoppler-qt-dev libpoppler-qt4-2 libpoppler-qt4-dev poppler-utils
Architecture: source
Version: 0.6.4-1ubuntu3.5
Distribution: hardy-security
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 libpoppler-dev - PDF rendering library -- development files
 libpoppler-glib-dev - PDF rendering library -- development files (GLib interface)
 libpoppler-glib2 - PDF rendering library (GLib-based shared library)
 libpoppler-qt-dev - PDF rendering library -- development files (Qt 3 interface)
 libpoppler-qt2 - PDF rendering library (Qt 3 based shared library)
 libpoppler-qt4-2 - PDF rendering library (Qt 4 based shared library)
 libpoppler-qt4-dev - PDF rendering library -- development files (Qt 4 interface)
 libpoppler2 - PDF rendering library
 poppler-utils - PDF utilitites (based on libpoppler)
Changes: 
 poppler (0.6.4-1ubuntu3.5) hardy-security; urgency=low
 .
   * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
     - debian/patches/108_security_CVE-2010-3702.patch: properly initialize
       parser in poppler/Gfx.cc.
     - CVE-2010-3702
   * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
     - debian/patches/109_security_CVE-2010-3704.patch: make sure code isn't
       < 0 in fofi/FoFiType1.cc.
     - CVE-2010-3704
Files: 
 5e30251249c773f2fdb94278bf11050c 1832 devel optional poppler_0.6.4-1ubuntu3.5.dsc
 e40e61ff8f404dd8c570d7d9d37d3344 22610 devel optional poppler_0.6.4-1ubuntu3.5.diff.gz
Original-Maintainer: Ondřej Surý <ondrej at debian.org>


More information about the Hardy-changes mailing list