<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>24286</bug_id>
          
          <creation_ts>2010-10-13 10:46:10 +0400</creation_ts>
          <short_desc>Multiple vulnerabilities: CVE-2010-3702, CVE-2010-3703, CVE-2010-3704</short_desc>
          <delta_ts>2010-10-21 08:52:19 +0400</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>poppler</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://secunia.com/advisories/41596/</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Sergey V Turchin">zerg</assigned_to>
          <cc>zerg</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>113641</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2010-10-13 10:46:10 +0400</bug_when>
    <thetext>1) An error in &quot;Gfx::getPos()&quot; can be exploited to dereference an uninitialised pointer.

2) An array indexing error exists when parsing Type1 fonts in &quot;FoFiType1::parse()&quot;, which can be exploited to corrupt memory via a specially crafted PDF file.

3) Other vulnerabilities are caused due to e.g. memory leak errors, which can be exploited to cause a crash by tricking a user into processing a specially crafted PDF file in an application using the library.

Also see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165

Fixed(?) in 0.14.4</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>114023</commentid>
    <comment_count>1</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2010-10-20 09:32:25 +0400</bug_when>
    <thetext>В Sisyphus 0.14.4-alt1. Можно закрывать баг или он ешё нужен в открытом состоянии?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>114042</commentid>
    <comment_count>2</comment_count>
    <who name="Sergey V Turchin">zerg</who>
    <bug_when>2010-10-20 14:00:19 +0400</bug_when>
    <thetext>В 0.14.4-alt1 исправлено. Я это выяснил уже после отправки на сборку.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>