Branches for Jaunty

Name Status Last Modified Last Commit
lp:ubuntu/jaunty/poppler 2 Mature 2009-12-04 23:11:40 UTC
61. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2009-04-16 22:40:29 UTC

* SECURITY UPDATE: denial of service and possible code execution from
  multiple integer overflows, buffer overflows, and other issues with
  JBIG2 decoding. (LP: #361875)
  - debian/patches/11_security_jbig2.patch: prevent integer overflow in
    poppler/CairoOutputDev.cc and splash/SplashBitmap.cc, add overflow
    checking, improve error handling, and fix other issues in
    poppler/JBIG2Stream.*.
  - CVE-2009-0146
  - CVE-2009-0147
  - CVE-2009-0166
  - CVE-2009-0799
  - CVE-2009-0800
  - CVE-2009-1179
  - CVE-2009-1180
  - CVE-2009-1181
  - CVE-2009-1182
  - CVE-2009-1183
  - CVE-2009-1187
  - CVE-2009-1188

lp:ubuntu/jaunty-proposed/poppler bug 2 Mature 2009-12-04 23:18:10 UTC
63. debian/patches/20_pdftops-multiple-pa...

Author: Till Kamppeter
Revision Date: 2009-06-22 16:43:49 UTC

debian/patches/20_pdftops-multiple-page-size-support.patch: Made new
page-size-conserving PostScript output mode working together with Duplex,
(LP: #382379).

lp:ubuntu/jaunty-security/poppler bug 2 Mature 2010-10-13 16:35:24 UTC
64. * SECURITY UPDATE: possible arbitrary...

Author: Marc Deslauriers
Revision Date: 2010-10-13 16:35:24 UTC

* SECURITY UPDATE: possible arbitrary code execution via malformed PDF
  - debian/patches/33_security_CVE-2010-3702.patch: properly initialize
    parser in poppler/Gfx.cc.
  - CVE-2010-3702
* SECURITY UPDATE: possible arbitrary code execution via malformed PDF
  - debian/patches/34_security_CVE-2010-3704.patch: make sure code isn't
    < 0 in fofi/FoFiType1.cc.
  - CVE-2010-3704

lp:ubuntu/jaunty-updates/poppler 2 Mature 2010-10-13 16:35:24 UTC
64. * SECURITY UPDATE: possible arbitrary...

Author: Marc Deslauriers
Revision Date: 2010-10-13 16:35:24 UTC

* SECURITY UPDATE: possible arbitrary code execution via malformed PDF
  - debian/patches/33_security_CVE-2010-3702.patch: properly initialize
    parser in poppler/Gfx.cc.
  - CVE-2010-3702
* SECURITY UPDATE: possible arbitrary code execution via malformed PDF
  - debian/patches/34_security_CVE-2010-3704.patch: make sure code isn't
    < 0 in fofi/FoFiType1.cc.
  - CVE-2010-3704

14 of 4 results