Comment 1 for bug 28030

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Thu, 5 Jan 2006 14:03:16 +0100
From: Martin Pitt <email address hidden>
To: Debian BTS Submit <email address hidden>
Cc: <email address hidden>
Subject: poppler: New integer overflows [CVE-2005-3624, CVE-2005-3625, CVE-2005-3627]

--1SQmhf2mF2YjsYvc
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: poppler
Version: 0.4.3-1
Severity: critical
Tags: security patch

Hi!

Chris Evans found some more integer overflows in the xpdf code [1]
which affect poppler as well. [1] also has demo exploit PDFs for patch
checking.

In addition, upstream used a slightly wrong patch for CVE-2005-3192, I
reported that as [2] and included the fix in the latest Ubuntu
version.

See [4] for the Ubuntu debdiff. I also forwarded the patch upstream [3].

Thanks,

Martin

[1] http://scary.beasts.org/security/b0dfca810501f2da/CESA-2005-003.txt
[2] https://bugs.freedesktop.org/show_bug.cgi?id=3D5514
[3] https://bugs.freedesktop.org/show_bug.cgi?id=3D5516
[4] http://patches.ubuntu.com/patches/poppler.CVE-2005-3624_5_7.diff

--=20
Martin Pitt http://www.piware.de
Ubuntu Developer http://www.ubuntu.com
Debian Developer http://www.debian.org

In a world without walls and fences, who needs Windows and Gates?

--1SQmhf2mF2YjsYvc
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDvRkUDecnbV4Fd/IRAhu0AKCsHpFzc1iVaN+NbpIHjNawX/wTJQCeIZ8F
wxxZLNPaqS5D6XgpdiSKmsc=
=ojuz
-----END PGP SIGNATURE-----

--1SQmhf2mF2YjsYvc--