poppler (0.12.4-0ubuntu5.1) lucid-security; urgency=low * SECURITY UPDATE: possible arbitrary code execution via malformed PDF - debian/patches/CVE-2010-3702.patch: properly initialize parser in poppler/Gfx.cc. - CVE-2010-3702 * SECURITY UPDATE: possible arbitrary code execution via malformed PDF - debian/patches/CVE-2010-3703.patch: Properly initialize stack in poppler/Function.cc. - CVE-2010-3703 * SECURITY UPDATE: possible arbitrary code execution via malformed PDF - debian/patches/CVE-2010-3704.patch: make sure code isn't < 0 in fofi/FoFiType1.cc. - CVE-2010-3704
Date: Wed, 13 Oct 2010 15:50:31 -0400 Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com> Maintainer: Ubuntu Desktop Team <ubuntu-desk...@lists.ubuntu.com> https://launchpad.net/ubuntu/lucid/+source/poppler/0.12.4-0ubuntu5.1
Format: 1.8 Date: Wed, 13 Oct 2010 15:50:31 -0400 Source: poppler Binary: libpoppler5 libpoppler-dev libpoppler-glib4 libpoppler-glib-dev libpoppler-qt2 libpoppler-qt-dev libpoppler-qt4-3 libpoppler-qt4-dev poppler-utils poppler-dbg Architecture: source Version: 0.12.4-0ubuntu5.1 Distribution: lucid-security Urgency: low Maintainer: Ubuntu Desktop Team <ubuntu-desk...@lists.ubuntu.com> Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com> Description: libpoppler-dev - PDF rendering library -- development files libpoppler-glib-dev - PDF rendering library -- development files (GLib interface) libpoppler-glib4 - PDF rendering library (GLib-based shared library) libpoppler-qt-dev - PDF rendering library -- development files (Qt 3 interface) libpoppler-qt2 - PDF rendering library (Qt 3 based shared library) libpoppler-qt4-3 - PDF rendering library (Qt 4 based shared library) libpoppler-qt4-dev - PDF rendering library -- development files (Qt 4 interface) libpoppler5 - PDF rendering library poppler-dbg - PDF rendering library - detached debugging symbols poppler-utils - PDF utilitites (based on libpoppler) Changes: poppler (0.12.4-0ubuntu5.1) lucid-security; urgency=low . * SECURITY UPDATE: possible arbitrary code execution via malformed PDF - debian/patches/CVE-2010-3702.patch: properly initialize parser in poppler/Gfx.cc. - CVE-2010-3702 * SECURITY UPDATE: possible arbitrary code execution via malformed PDF - debian/patches/CVE-2010-3703.patch: Properly initialize stack in poppler/Function.cc. - CVE-2010-3703 * SECURITY UPDATE: possible arbitrary code execution via malformed PDF - debian/patches/CVE-2010-3704.patch: make sure code isn't < 0 in fofi/FoFiType1.cc. - CVE-2010-3704 Checksums-Sha1: 72bb4e363237b172d81ba65cc368911fb62dfdde 2321 poppler_0.12.4-0ubuntu5.1.dsc 1baeb71a1c5072ff4bcb81236f4301137cb39536 36586 poppler_0.12.4-0ubuntu5.1.diff.gz Checksums-Sha256: 844139bf9986a97e53e20f0c4eb2bc895320824de9320242ae3dadaca350fa56 2321 poppler_0.12.4-0ubuntu5.1.dsc badc654a826d327ba209604caaeba14c62d6a2cf281742685579fb3fdbb29ff7 36586 poppler_0.12.4-0ubuntu5.1.diff.gz Files: 6309c218890373f2d2f3829083f1e14e 2321 devel optional poppler_0.12.4-0ubuntu5.1.dsc 3c8f46489d270a6553c603f1bf42df61 36586 devel optional poppler_0.12.4-0ubuntu5.1.diff.gz Original-Maintainer: Loic Minier <l...@dooz.org>
-- Lucid-changes mailing list Lucid-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/lucid-changes