Ubuntu

[xpdf] [CVE-2008-1693] possibility of arbitrary code execution

Reported by disabled.user on 2008-05-06
258
Affects Status Importance Assigned to Milestone
xpdf (Ubuntu)
Undecided
Unassigned
Declined for Hardy by Jamie Strandboge
Dapper
Undecided
Unassigned
Feisty
Undecided
Unassigned
Gutsy
Undecided
Unassigned

Bug Description

Binary package hint: xpdf

This has been fixed for poppler and kword as USN-603-1 and USN-603-2, but xpdf is still vulnerable.

Please see also: DSA-1548 (http://www.debian.org/security/2008/dsa-1548)

CVE References

Jamie Strandboge (jdstrand) wrote :

Hardy and Intrepid both have 3.02-1.3ubuntu1, which is not affected.

Changed in xpdf:
status: New → Invalid
Hew McLachlan (hew) wrote :

Ubuntu Feisty Fawn is no longer supported, so a SRU will not be issued for this release. Marking Feisty as Won't Fix.

Changed in xpdf:
status: New → Won't Fix
Sergio Zanchetta (primes2h) wrote :

The 18 month support period for Gutsy Gibbon 7.10 has reached its end of life -
http://www.ubuntu.com/news/ubuntu-7.10-eol . As a result, we are closing the
Gutsy task.

Changed in xpdf (Ubuntu Gutsy):
status: New → Won't Fix
Jamie Strandboge (jdstrand) wrote :

Thank you for reporting this bug to Ubuntu. dapper has reached EOL
(End of Life) and is no longer supported. As a result, this bug
against dapper is being marked "Won't Fix". Please see
https://wiki.ubuntu.com/Releases for currently supported Ubuntu
releases.

Please feel free to report any other bugs you may find.

Changed in xpdf (Ubuntu Dapper):
status: New → Won't Fix
To post a comment you must log in.
This report contains Public Security information  Edit
Everyone can see this security related information.

Other bug subscribers