Your message dated Mon, 25 Mar 2013 21:17:55 +0000
with message-id <e1ukemb-0008qd...@franck.debian.org>
and subject line Bug#702071: fixed in poppler 0.18.4-6
has caused the Debian Bug report #702071,
regarding CVE-2013-1788, CVE-2013-1789 and CVE-2013-1790
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
702071: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: poppler
Severity: grave
Tags: security

Hi,

the following vulnerabilities were published for poppler.

CVE-2013-1788[0]:
invalid memory issues

CVE-2013-1789[1]:
crash in broken documents

CVE-2013-1790[2]:
uninitialized memory read

Patches are referenced in the Red Hat Bugzilla to the relevant commits.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

Could you check which Debian package versions are affected? (not for all
issues, all patches might be relevant). At least for the unitialized
memory read issiue the code seems present in stable.

For further information see:

[0] http://security-tracker.debian.org/tracker/CVE-2013-1788
[1] http://security-tracker.debian.org/tracker/CVE-2013-1789
[2] http://security-tracker.debian.org/tracker/CVE-2013-1790

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: poppler
Source-Version: 0.18.4-6

We believe that the bug you reported is fixed in the latest version of
poppler, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 702...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pino Toscano <p...@debian.org> (supplier of updated poppler package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 25 Mar 2013 21:43:07 +0100
Source: poppler
Binary: libpoppler19 libpoppler-dev libpoppler-private-dev libpoppler-glib8 
libpoppler-glib-dev gir1.2-poppler-0.18 libpoppler-qt4-3 libpoppler-qt4-dev 
libpoppler-cpp0 libpoppler-cpp-dev poppler-utils poppler-dbg
Architecture: source amd64
Version: 0.18.4-6
Distribution: unstable
Urgency: low
Maintainer: Loic Minier <l...@dooz.org>
Changed-By: Pino Toscano <p...@debian.org>
Description: 
 gir1.2-poppler-0.18 - GObject introspection data for poppler-glib
 libpoppler-cpp-dev - PDF rendering library -- development files (CPP interface)
 libpoppler-cpp0 - PDF rendering library (CPP shared library)
 libpoppler-dev - PDF rendering library -- development files
 libpoppler-glib-dev - PDF rendering library -- development files (GLib 
interface)
 libpoppler-glib8 - PDF rendering library (GLib-based shared library)
 libpoppler-private-dev - PDF rendering library -- private development files
 libpoppler-qt4-3 - PDF rendering library (Qt 4 based shared library)
 libpoppler-qt4-dev - PDF rendering library -- development files (Qt 4 
interface)
 libpoppler19 - PDF rendering library
 poppler-dbg - PDF rendering library -- debugging symbols
 poppler-utils - PDF utilities (based on Poppler)
Closes: 702071
Changes: 
 poppler (0.18.4-6) unstable; urgency=low
 .
   * Backport upstream commits 0388837f01bc467045164f9ddaff787000a8caaa (patch
     upstream_Fix-another-invalid-memory-access-in-1091.pdf.asan.7.patch),
     8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 (adapted patch
     upstream_Fix-invalid-memory-access-in-1150.pdf.asan.8.69.patch), and
     e14b6e9c13d35c9bd1e0c50906ace8e707816888 (adapted patch
     upstream_Fix-invalid-memory-access-in-2030.pdf.asan.69.463.patch) to fix
     CVE-2013-1788.
   * Backport upstream commit b1026b5978c385328f2a15a2185c599a563edf91 to fix
     CVE-2013-1790 (patch upstream_Initialize-refLine-totally.patch).
   * With the changes above, this upload closes: #702071.
Checksums-Sha1: 
 c12bf43420675491afab8fa8b45d747a35a0bf04 2356 poppler_0.18.4-6.dsc
 2cb490c8b377d07d84496b23b67ec0fdac85139f 21714 poppler_0.18.4-6.debian.tar.gz
 27f0fe6d6b625eeb90823fd9f8d46e629cba7ee9 1109420 
libpoppler19_0.18.4-6_amd64.deb
 da90ec76c6b9dd43bd27a70754bc17fb39ef080b 917992 
libpoppler-dev_0.18.4-6_amd64.deb
 d45822f399ce83f226ea18f1d8177a2566185924 209208 
libpoppler-private-dev_0.18.4-6_amd64.deb
 caec5246e122bdb94fa32b7eaa891a42180646fd 106378 
libpoppler-glib8_0.18.4-6_amd64.deb
 2075ddeac827862fc7a088781b731eadd8169508 232490 
libpoppler-glib-dev_0.18.4-6_amd64.deb
 8f4ad2e1211119648c9164ea2b106e0b48a3f0d3 28896 
gir1.2-poppler-0.18_0.18.4-6_amd64.deb
 159cd089da7bc8a8d9bbd1bd9bf07eb4c220bf3f 140588 
libpoppler-qt4-3_0.18.4-6_amd64.deb
 06ae5922ff36f84df8db98c029ace8b7dbd92e6e 190632 
libpoppler-qt4-dev_0.18.4-6_amd64.deb
 b37af0c0a338caf973487e228c0907868ff1e3bd 47910 
libpoppler-cpp0_0.18.4-6_amd64.deb
 080fd89d0b1db3044e444aa8196668874a3e5293 56266 
libpoppler-cpp-dev_0.18.4-6_amd64.deb
 77fb9d39145c60421462a8fe8315d0adaa49a38c 162034 
poppler-utils_0.18.4-6_amd64.deb
 34ccd89c84907879d64701de2d779b6e821c1bff 5142400 poppler-dbg_0.18.4-6_amd64.deb
Checksums-Sha256: 
 ce309363bbe2f303f29dcc9cba68c749df8c66d13df4dc05e4241c029612fcdc 2356 
poppler_0.18.4-6.dsc
 98e391067b6f2fa224a4120f2e56fead858fcc21f2629fc7fbe6c2d988a839b1 21714 
poppler_0.18.4-6.debian.tar.gz
 4cc541c85df2aeb582367072bc9279fc20572727bc535ce7974b59d241120e31 1109420 
libpoppler19_0.18.4-6_amd64.deb
 18137b1d525990b9595d1e38271fa3c19562e75c05659066088b911b624649bf 917992 
libpoppler-dev_0.18.4-6_amd64.deb
 7d4f9ddf8feb102f22575aceee5d6377bf2fd252100c0e9ed730f2e27139b5ab 209208 
libpoppler-private-dev_0.18.4-6_amd64.deb
 b333b67b1a5ffc819c77c57ac8c65c92c60543deabbbbfa627249165849029c2 106378 
libpoppler-glib8_0.18.4-6_amd64.deb
 227e497272e4ffd3661168b5a119bb274c0fe8fde6828e699fe1235097a5475f 232490 
libpoppler-glib-dev_0.18.4-6_amd64.deb
 11d334549e17ea52f10413c6139ed926605c09f0821af6c44915f0432ca36658 28896 
gir1.2-poppler-0.18_0.18.4-6_amd64.deb
 75299b4d740541ac6bf1d87296a79d46da0b230cc245ad7c9b46b8f7d646645e 140588 
libpoppler-qt4-3_0.18.4-6_amd64.deb
 407c01cad2a10d64a5f1e83b39bf0a759e58f5e296197743d66c0723ffc44a8d 190632 
libpoppler-qt4-dev_0.18.4-6_amd64.deb
 3dfc606be0e3487e554a167aa1c52474cfd63134a421ef4fa14355fccbbb4cdf 47910 
libpoppler-cpp0_0.18.4-6_amd64.deb
 9556cb1166477c8ef6f161effad9d62e4771ba0061d0c247c262dae0e227db87 56266 
libpoppler-cpp-dev_0.18.4-6_amd64.deb
 38f2d13ccddac9e3d05abff7c5fab353d3fea550c8f39293850651e03c3f8be4 162034 
poppler-utils_0.18.4-6_amd64.deb
 1861e6f3f24f47a18392042e8458b75918fba7ac0b4aec7fbcd3f57ea39396c3 5142400 
poppler-dbg_0.18.4-6_amd64.deb
Files: 
 4fdf2a89340d29f1c2a1a6ec56144171 2356 devel optional poppler_0.18.4-6.dsc
 70cba07fb8a1ee835e2c67cfeaae459d 21714 devel optional 
poppler_0.18.4-6.debian.tar.gz
 ac2a329440e594bf9225ad5ad071478c 1109420 libs optional 
libpoppler19_0.18.4-6_amd64.deb
 a43097cfcaecdb0a186f9ef04298694b 917992 libdevel optional 
libpoppler-dev_0.18.4-6_amd64.deb
 8d7e4106d80b3709723a3948be6b2469 209208 libdevel optional 
libpoppler-private-dev_0.18.4-6_amd64.deb
 e182ba8b6530a20248d49d249a1e5224 106378 libs optional 
libpoppler-glib8_0.18.4-6_amd64.deb
 f0d214b4d260b47ba3f4cd3188afd3d6 232490 libdevel optional 
libpoppler-glib-dev_0.18.4-6_amd64.deb
 ab7b8dd97720fe46edd50c2abb9ac86e 28896 introspection optional 
gir1.2-poppler-0.18_0.18.4-6_amd64.deb
 9fce7c910fd64432a4a502892d418604 140588 libs optional 
libpoppler-qt4-3_0.18.4-6_amd64.deb
 9a9b6d0ffb95123d5e9bf30e4bc9b304 190632 libdevel optional 
libpoppler-qt4-dev_0.18.4-6_amd64.deb
 a3396c97c962d9d6475ec73db2106485 47910 libs optional 
libpoppler-cpp0_0.18.4-6_amd64.deb
 1c8766828a11fc3fef10d9f0c9bf28f4 56266 libdevel optional 
libpoppler-cpp-dev_0.18.4-6_amd64.deb
 0f0254920f85b6190ba7b03f4d2a7d73 162034 utils optional 
poppler-utils_0.18.4-6_amd64.deb
 a3ac0663323df13d07fba659f6a91348 5142400 debug extra 
poppler-dbg_0.18.4-6_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRULnRTNH2piB/L3oRAuHrAJ9Ei8Rgo2L/XpYXBc7l+539iaotxACgghUr
wkZLgAnWT/YdgaZ4qUOk01c=
=TqXO
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to