poppler (0.12.4-0ubuntu5.1) lucid-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
    - debian/patches/CVE-2010-3702.patch: properly initialize parser in
      poppler/Gfx.cc.
    - CVE-2010-3702
  * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
    - debian/patches/CVE-2010-3703.patch: Properly initialize stack in
      poppler/Function.cc.
    - CVE-2010-3703
  * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
    - debian/patches/CVE-2010-3704.patch: make sure code isn't < 0 in
      fofi/FoFiType1.cc.
    - CVE-2010-3704

Date: Wed, 13 Oct 2010 15:50:31 -0400
Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com>
Maintainer: Ubuntu Desktop Team <ubuntu-desk...@lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/poppler/0.12.4-0ubuntu5.1
Format: 1.8
Date: Wed, 13 Oct 2010 15:50:31 -0400
Source: poppler
Binary: libpoppler5 libpoppler-dev libpoppler-glib4 libpoppler-glib-dev 
libpoppler-qt2 libpoppler-qt-dev libpoppler-qt4-3 libpoppler-qt4-dev 
poppler-utils poppler-dbg
Architecture: source
Version: 0.12.4-0ubuntu5.1
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Desktop Team <ubuntu-desk...@lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com>
Description: 
 libpoppler-dev - PDF rendering library -- development files
 libpoppler-glib-dev - PDF rendering library -- development files (GLib 
interface)
 libpoppler-glib4 - PDF rendering library (GLib-based shared library)
 libpoppler-qt-dev - PDF rendering library -- development files (Qt 3 interface)
 libpoppler-qt2 - PDF rendering library (Qt 3 based shared library)
 libpoppler-qt4-3 - PDF rendering library (Qt 4 based shared library)
 libpoppler-qt4-dev - PDF rendering library -- development files (Qt 4 
interface)
 libpoppler5 - PDF rendering library
 poppler-dbg - PDF rendering library - detached debugging symbols
 poppler-utils - PDF utilitites (based on libpoppler)
Changes: 
 poppler (0.12.4-0ubuntu5.1) lucid-security; urgency=low
 .
   * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
     - debian/patches/CVE-2010-3702.patch: properly initialize parser in
       poppler/Gfx.cc.
     - CVE-2010-3702
   * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
     - debian/patches/CVE-2010-3703.patch: Properly initialize stack in
       poppler/Function.cc.
     - CVE-2010-3703
   * SECURITY UPDATE: possible arbitrary code execution via malformed PDF
     - debian/patches/CVE-2010-3704.patch: make sure code isn't < 0 in
       fofi/FoFiType1.cc.
     - CVE-2010-3704
Checksums-Sha1: 
 72bb4e363237b172d81ba65cc368911fb62dfdde 2321 poppler_0.12.4-0ubuntu5.1.dsc
 1baeb71a1c5072ff4bcb81236f4301137cb39536 36586 
poppler_0.12.4-0ubuntu5.1.diff.gz
Checksums-Sha256: 
 844139bf9986a97e53e20f0c4eb2bc895320824de9320242ae3dadaca350fa56 2321 
poppler_0.12.4-0ubuntu5.1.dsc
 badc654a826d327ba209604caaeba14c62d6a2cf281742685579fb3fdbb29ff7 36586 
poppler_0.12.4-0ubuntu5.1.diff.gz
Files: 
 6309c218890373f2d2f3829083f1e14e 2321 devel optional 
poppler_0.12.4-0ubuntu5.1.dsc
 3c8f46489d270a6553c603f1bf42df61 36586 devel optional 
poppler_0.12.4-0ubuntu5.1.diff.gz
Original-Maintainer: Loic Minier <l...@dooz.org>
-- 
Lucid-changes mailing list
Lucid-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/lucid-changes

Reply via email to