Public bug reported:
The security update poppler 0.62.0-2ubuntu2.13 that fixes CVE-2022-38784 adds a
new header file goo/GooCheckedOps.h that is included by goo/gmem.h
goo/gmem.h is a file installed in the libpoppler-private-dev package, which is
used by GDAL, but the patches added in the 0.62.0
@mdelsaur Thanks for the prompt fixes. I confirm they fix the issues I
had observed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to poppler in Ubuntu.
https://bugs.launchpad.net/bugs/1905741
Title:
poppler 0.62.0-2ubuntu2.1
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to poppler in Ubuntu.
https://bugs.launchpad.net/bugs/1905741
Title:
poppler 0.62.0-2ubuntu2.11 and 0.41.0-0ubuntu1.15
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to poppler in Ubuntu.
https://bugs.launchpad.net/bugs/1905741
Title:
poppler 0.62.0-2ubuntu2.11 and 0.41.0-0ubuntu1.15
Public bug reported:
The security updates 0.62.0-2ubuntu2.11 and 0.41.0-0ubuntu1.15 break the
Splash output rendering, for example if using the xpdf utility that
relies on Poppler splash output, or as used by the GDAL library (the
issue was detected due to breakage in GDAL continuous integration t
Will there be a security package with the patch ?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sqlite3 in Ubuntu.
https://bugs.launchpad.net/bugs/1700937
Title:
Heap-buffer overflow in nodeAcquire
Status in sqlite3 pack
@seth There's an error regarding the SQLite version number in the CVE
text. It should read "in SQLite before 3.17.0" (and not 3.11.0)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sqlite3 in Ubuntu.
https://bugs.launchpad.ne
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sqlite3 in Ubuntu.
https://bugs.launchpad.net/bugs/1700937
Title:
Heap-buffer overflow in nodeAcquire
Sta
I'm attaching a new patch CVE-2016-9297_and_CVE-2016-9448_correct.patch
that should be used in replacement of (so, *not* on top of)
CVE-2016-9297.patch and CVE-2016-9448.patch
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9297
** CVE added: http://www.cve.mitre.org/cgi-
bi
** Attachment added: "Updated debian/series file with
CVE-2016-9297_and_CVE-2016-9448_correct.patch"
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1670036/+attachment/4850345/+files/series
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, w
** Patch added: "Patch that should replace CVE-2016-9297.patch and
CVE-2016-9448.patch"
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1670036/+attachment/4850336/+files/CVE-2016-9297_and_CVE-2016-9448_correct.patch
--
You received this bug notification because you are a member of Ubunt
Public bug reported:
Ubuntu 10.04.4 LTS x86_64
ii libsqlite3-0 3.6.22-1
SQLite 3 shared library
ii sqlite3 3.6.22-1
A command line interf
12 matches
Mail list logo