Your message dated Sat, 5 Dec 2009 22:50:05 +0100
with message-id <20091205215004.ga3...@galadriel.inutil.org>
and subject line Re: poppler: integer overflow and null ptr dereference 
vulnerabilities
has caused the Debian Bug report #551289,
regarding poppler: integer overflow and null ptr dereference vulnerabilities
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
551289: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
package: poppler
version: 0.4.5-5.1
severity: serious
tags: security

hi,

it has been disclosed that xpdf is vulnerable to multiple new
vulnerabilities [0].  poppler is a fork of xpdf, and the proof of
concepts are effective.

these issues are also applicable to both stable and oldstable, so
please coordinate with the security team to release patched versions.
thanks.

mike

[0] http://seclists.org/fulldisclosure/2009/Oct/227



--- End Message ---
--- Begin Message ---
Version: 0.12.2-1

On Fri, Oct 16, 2009 at 05:53:37PM -0400, Michael Gilbert wrote:
> package: poppler
> version: 0.4.5-5.1
> severity: serious
> tags: security
> 
> hi,
> 
> it has been disclosed that xpdf is vulnerable to multiple new
> vulnerabilities [0].  poppler is a fork of xpdf, and the proof of
> concepts are effective.
> 
> these issues are also applicable to both stable and oldstable, so
> please coordinate with the security team to release patched versions.
> thanks.

Fixed in 0.12.2.

Cheers,
        Moritz


--- End Message ---

Reply via email to