[ubuntu/jaunty-security] poppler (delayed), poppler 0.10.5-1ubuntu2.6 (Accepted)
Ubuntu Installer
archive at ubuntu.com
Tue Oct 19 14:04:06 BST 2010
poppler (0.10.5-1ubuntu2.6) jaunty-security; urgency=low
* SECURITY UPDATE: possible arbitrary code execution via malformed PDF
- debian/patches/33_security_CVE-2010-3702.patch: properly initialize
parser in poppler/Gfx.cc.
- CVE-2010-3702
* SECURITY UPDATE: possible arbitrary code execution via malformed PDF
- debian/patches/34_security_CVE-2010-3704.patch: make sure code isn't
< 0 in fofi/FoFiType1.cc.
- CVE-2010-3704
Date: Wed, 13 Oct 2010 16:35:24 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/jaunty/+source/poppler/0.10.5-1ubuntu2.6
-------------- next part --------------
Format: 1.8
Date: Wed, 13 Oct 2010 16:35:24 -0400
Source: poppler
Binary: libpoppler4 libpoppler-dev libpoppler-glib4 libpoppler-glib-dev libpoppler-qt2 libpoppler-qt-dev libpoppler-qt4-3 libpoppler-qt4-dev poppler-utils poppler-dbg
Architecture: source
Version: 0.10.5-1ubuntu2.6
Distribution: jaunty-security
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
libpoppler-dev - PDF rendering library -- development files
libpoppler-glib-dev - PDF rendering library -- development files (GLib interface)
libpoppler-glib4 - PDF rendering library (GLib-based shared library)
libpoppler-qt-dev - PDF rendering library -- development files (Qt 3 interface)
libpoppler-qt2 - PDF rendering library (Qt 3 based shared library)
libpoppler-qt4-3 - PDF rendering library (Qt 4 based shared library)
libpoppler-qt4-dev - PDF rendering library -- development files (Qt 4 interface)
libpoppler4 - PDF rendering library
poppler-dbg - PDF rendering library - detached debugging symbols
poppler-utils - PDF utilitites (based on libpoppler)
Changes:
poppler (0.10.5-1ubuntu2.6) jaunty-security; urgency=low
.
* SECURITY UPDATE: possible arbitrary code execution via malformed PDF
- debian/patches/33_security_CVE-2010-3702.patch: properly initialize
parser in poppler/Gfx.cc.
- CVE-2010-3702
* SECURITY UPDATE: possible arbitrary code execution via malformed PDF
- debian/patches/34_security_CVE-2010-3704.patch: make sure code isn't
< 0 in fofi/FoFiType1.cc.
- CVE-2010-3704
Checksums-Sha1:
cf43aa0c88820a2a50b66acd1134140f6ae3b458 2319 poppler_0.10.5-1ubuntu2.6.dsc
a982acc1047380a4f538459d4bba8c198d0b6a98 22658 poppler_0.10.5-1ubuntu2.6.diff.gz
Checksums-Sha256:
b3b2546f4961333b536e066a49969adb23f2f9bd171e5a2d8732ac4f82713412 2319 poppler_0.10.5-1ubuntu2.6.dsc
86083d306faa3e36983348556c107976b50080bc5a4120dba68b891ca828366d 22658 poppler_0.10.5-1ubuntu2.6.diff.gz
Files:
cb6568c37577a77805a323102daf8cbe 2319 devel optional poppler_0.10.5-1ubuntu2.6.dsc
46a4434de1013ad6a1aedd7f83f4638e 22658 devel optional poppler_0.10.5-1ubuntu2.6.diff.gz
Original-Maintainer: Loic Minier <lool at dooz.org>
More information about the Jaunty-changes
mailing list