Summary: | <app-text/poppler-0.24.3 : multiple vulnerabilities (CVE-2013-{4473,4474}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | reavertm, stephan.litterst |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2013/10/29/1 | ||
Whiteboard: | A2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 490022 | ||
Bug Blocks: |
Description
Agostino Sarubbo
![]() Now this one will need a libreoffice-bin rebuild... 2.24.3 bumped arches, please test and mark stable: =app-text/poppler-2.24.3 target KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86" (In reply to Mikle Kolyada from comment #3) > arches, please test and mark stable: > > =app-text/poppler-2.24.3 > > target KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86" and its dependency =net-print/cups-filters-1.0.36-r1 same targets... (note, -r1 and NOT -r2 which requires newer gs) amd64 / x86 stable *** Bug 490046 has been marked as a duplicate of this bug. *** alpha stable ppc stable ppc64 stable arm stable Stable for HPPA. Re-adding alpha/arm/ppc/ppc64 for cups-filters alpha stable arm stable ppc stable ppc64 stable ia64 stable CVE-2013-4474 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4474): Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 024.2 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename. CVE-2013-4473 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4473): Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename. sparc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. glsa request filed All vulnerable versions have been removed. This issue was resolved and addressed in GLSA 201401-21 at http://security.gentoo.org/glsa/glsa-201401-21.xml by GLSA coordinator Sean Amoss (ackle). |