Change log for poppler package in Ubuntu
76 → 150 of 377 results | First • Previous • Next • Last |
poppler (0.76.1-0ubuntu1) eoan; urgency=medium * New upstream release sed s/libpoppler82/libpoppler85/g -- Gianfranco Costamagna <email address hidden> Tue, 07 May 2019 11:01:01 +0200
Available diffs
poppler (0.68.0-0ubuntu1.6) cosmic-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-9200.patch: fix in poppler/Stream.cc. - CVE-2019-9200 -- <email address hidden> (Leonidas S. Barbosa) Thu, 28 Feb 2019 12:47:51 -0300
Available diffs
- diff from 0.68.0-0ubuntu1.5 to 0.68.0-0ubuntu1.6 (834 bytes)
poppler (0.62.0-2ubuntu2.8) bionic-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-9200.patch: fix in poppler/Stream.cc. - CVE-2019-9200 -- <email address hidden> (Leonidas S. Barbosa) Thu, 28 Feb 2019 09:28:47 -0300
Available diffs
- diff from 0.62.0-2ubuntu2.7 to 0.62.0-2ubuntu2.8 (828 bytes)
poppler (0.41.0-0ubuntu1.13) xenial-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-9200.patch: fix in poppler/Stream.cc. - CVE-2019-9200 -- <email address hidden> (Leonidas S. Barbosa) Thu, 28 Feb 2019 09:25:31 -0300
Available diffs
poppler (0.24.5-2ubuntu4.17) trusty-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-9200.patch: fix in poppler/Stream.cc. - CVE-2019-9200 -- <email address hidden> (Leonidas S. Barbosa) Thu, 28 Feb 2019 09:14:27 -0300
Available diffs
Superseded in eoan-release |
Obsolete in disco-release |
Deleted in disco-proposed (Reason: moved to release) |
poppler (0.74.0-0ubuntu1) disco; urgency=medium * New upstream version, remove the patches included in the update * Updated for the soname change libpoppler82 -> libpoppler85 * debian/rules: ENABLE_XPDF_HEADERS -> ENABLE_UNSTABLE_API_ABI_HEADERS -- Sebastien Bacher <email address hidden> Thu, 21 Feb 2019 11:18:59 +0100
Available diffs
- diff from 0.71.0-2ubuntu4 to 0.74.0-0ubuntu1 (457.1 KiB)
poppler (0.71.0-2ubuntu4) disco; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-7310.patch: fix in poppler/XRef.cc. - CVE-2019-7310 -- <email address hidden> (Leonidas S. Barbosa) Mon, 11 Feb 2019 10:25:07 -0300
Available diffs
- diff from 0.71.0-2ubuntu3 to 0.71.0-2ubuntu4 (915 bytes)
poppler (0.68.0-0ubuntu1.5) cosmic-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20551.patch: fix in poppler/Annot.cc. - CVE-2018-20551 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-7310.patch: fix in poppler/XRef.cc. - CVE-2019-7310 -- <email address hidden> (Leonidas S. Barbosa) Fri, 08 Feb 2019 12:12:49 -0300
Available diffs
poppler (0.24.5-2ubuntu4.16) trusty-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-7310.patch: fix in poppler/XRef.cc. - CVE-2019-7310 -- <email address hidden> (Leonidas S. Barbosa) Fri, 08 Feb 2019 11:16:54 -0300
Available diffs
poppler (0.62.0-2ubuntu2.7) bionic-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20551.patch: fix in poppler/Annot.cc. - CVE-2018-20551 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-7310.patch: fix in poppler/XRef.cc. - CVE-2019-7310 -- <email address hidden> (Leonidas S. Barbosa) Fri, 08 Feb 2019 09:50:52 -0300
Available diffs
poppler (0.41.0-0ubuntu1.12) xenial-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20551.patch: fix in poppler/Annot.cc. - CVE-2018-20551 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-7310.patch: fix in poppler/XRef.cc. - CVE-2019-7310 -- <email address hidden> (Leonidas S. Barbosa) Wed, 06 Feb 2019 14:44:16 -0300
Available diffs
poppler (0.71.0-2ubuntu3) disco; urgency=medium * SECURITY UPDATE: infinite recursion via crafted file - debian/patches/CVE-2018-16646.patch: avoid cycles in PDF parsing in poppler/Parser.cc, poppler/XRef.h. This patch also includes the regression fix in check entry. - CVE-2018-16646 * SECURITY UPDATE: denial of service via reachable abort - debian/patches/CVE-2018-19058.patch: check for stream before calling stream methods when saving an embedded file in poppler/FileSpec.cc. - CVE-2018-19058 * SECURITY UPDATE: denial of service via out-of-bounds read - debian/patches/CVE-2018-19059.patch: check for valid embedded file before trying to save it in utils/pdfdetach.cc. - CVE-2018-19059 * SECURITY UPDATE: denial of service via NULL pointer dereference - debian/patches/CVE-2018-19060.patch: check for valid file name of embedded file in utils/pdfdetach.cc. - CVE-2018-19060 -- <email address hidden> (Leonidas S. Barbosa) Mon, 28 Jan 2019 09:58:13 -0300
Available diffs
poppler (0.71.0-2ubuntu2) disco; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20481.patch: fix in poppler/XRef.cc. - CVE-2018-20481 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20551.patch: fix in poppler/Annot.cc. - CVE-2018-20551 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20650.patch: fix in poppler/FileSpec.cc. - CVE-2018-20650 -- <email address hidden> (Leonidas S. Barbosa) Mon, 21 Jan 2019 09:35:54 -0300
Available diffs
poppler (0.68.0-0ubuntu1.4) cosmic-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20481.patch: fix in poppler/XRef.cc. - CVE-2018-20481 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20650.patch: fix in poppler/FileSpec.cc. - CVE-2018-20650 -- <email address hidden> (Leonidas S. Barbosa) Mon, 21 Jan 2019 09:54:17 -0300
Available diffs
poppler (0.62.0-2ubuntu2.6) bionic-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20481.patch: fix in poppler/XRef.cc. - CVE-2018-20481 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20650.patch: fix in poppler/FileSpec.cc. - CVE-2018-20650 -- <email address hidden> (Leonidas S. Barbosa) Mon, 21 Jan 2019 10:55:43 -0300
Available diffs
poppler (0.41.0-0ubuntu1.11) xenial-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20481.patch: fix in poppler/XRef.cc. - CVE-2018-20481 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20650.patch: fix in poppler/FileSpec.cc. - CVE-2018-20650 -- <email address hidden> (Leonidas S. Barbosa) Mon, 21 Jan 2019 12:10:09 -0300
Available diffs
poppler (0.24.5-2ubuntu4.15) trusty-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20481.patch: fix in poppler/XRef.cc. - CVE-2018-20481 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-20650.patch: fix in poppler/FileSpec.cc. - CVE-2018-20650 -- <email address hidden> (Leonidas S. Barbosa) Mon, 21 Jan 2019 13:21:05 -0300
Available diffs
poppler (0.71.0-2ubuntu1) disco; urgency=low * Merge from Debian unstable. Remaining changes: - do not use openjpeg (universe, MIR pending) - fix jpx security bugs, because of internal copy, can be dropped once openjpeg goes in main - CVE-2017-9083.patch - CVE-2017-2820.patch
Available diffs
- diff from 0.71.0-1ubuntu1 to 0.71.0-2ubuntu1 (508 bytes)
poppler (0.71.0-1ubuntu1) disco; urgency=medium * Merge from Debian experimental. Remaining changes: - do not use openjpeg (universe, MIR pending) - fix jpx security bugs, because of internal copy, can be dropped once openjpeg goes in main - CVE-2017-9083.patch - CVE-2017-2820.patch
Available diffs
poppler (0.68.0-0ubuntu1.3) cosmic-security; urgency=medium * SECURITY REGRESSION: fixing regression in check entry - debian/patches/CVE-2018-16646-fix-regression-p1.patch - debian/patches/CVE-2018-16646-fix-regression-p2.patch -- <email address hidden> (Leonidas S. Barbosa) Mon, 10 Dec 2018 15:46:44 -0300
Available diffs
poppler (0.24.5-2ubuntu4.14) trusty-security; urgency=medium * SECURITY REGRESSION: fixing regression in check entry - debian/patches/CVE-2018-16646-fix-regression-p1.patch - debian/patches/CVE-2018-16646-fix-regression-p2.patch -- <email address hidden> (Leonidas S. Barbosa) Tue, 11 Dec 2018 10:14:13 -0300
Available diffs
poppler (0.41.0-0ubuntu1.10) xenial-security; urgency=medium * SECURITY REGRESSION: fixing patch applied previously for CVE-2018-19149 - debian/patch/CVE-2018-19149-fixing-previous.patch * SECURITY REGRESSION: fixing regression in check entry - debian/patches/CVE-2018-16646-fix-regression-p1.patch - debian/patches/CVE-2018-16646-fix-regression-p2.patch -- <email address hidden> (Leonidas S. Barbosa) Mon, 10 Dec 2018 16:08:10 -0300
Available diffs
poppler (0.62.0-2ubuntu2.5) bionic-security; urgency=medium * SECURITY REGRESSION: fixing regression in check entry - debian/patches/CVE-2018-16646-fix-regression-p1.patch - debian/patches/CVE-2018-16646-fix-regression-p2.patch -- <email address hidden> (Leonidas S. Barbosa) Mon, 10 Dec 2018 14:14:38 -0300
Available diffs
poppler (0.68.0-0ubuntu1.2) cosmic-security; urgency=medium [ Marc Deslauriers ] * SECURITY UPDATE: infinite recursion via crafted file - debian/patches/CVE-2018-16646.patch: avoid cycles in PDF parsing in poppler/Parser.cc, poppler/XRef.h. - CVE-2018-16646 * SECURITY UPDATE: denial of service via reachable abort - debian/patches/CVE-2018-19058.patch: check for stream before calling stream methods when saving an embedded file in poppler/FileSpec.cc. - CVE-2018-19058 * SECURITY UPDATE: denial of service via out-of-bounds read - debian/patches/CVE-2018-19059.patch: check for valid embedded file before trying to save it in utils/pdfdetach.cc. - CVE-2018-19059 * SECURITY UPDATE: denial of service via NULL pointer dereference - debian/patches/CVE-2018-19060.patch: check for valid file name of embedded file in utils/pdfdetach.cc. - CVE-2018-19060 -- <email address hidden> (Leonidas S. Barbosa) Mon, 03 Dec 2018 13:14:23 -0300
Available diffs
poppler (0.62.0-2ubuntu2.4) bionic-security; urgency=medium [ Marc Deslauriers ] * SECURITY UPDATE: infinite recursion via crafted file - debian/patches/CVE-2018-16646.patch: avoid cycles in PDF parsing in poppler/Parser.cc, poppler/XRef.h. - CVE-2018-16646 * SECURITY UPDATE: denial of service via reachable abort - debian/patches/CVE-2018-19058.patch: check for stream before calling stream methods when saving an embedded file in poppler/FileSpec.cc. - CVE-2018-19058 * SECURITY UPDATE: denial of service via out-of-bounds read - debian/patches/CVE-2018-19059.patch: check for valid embedded file before trying to save it in utils/pdfdetach.cc. - CVE-2018-19059 * SECURITY UPDATE: denial of service via NULL pointer dereference - debian/patches/CVE-2018-19060.patch: check for valid file name of embedded file in utils/pdfdetach.cc. - CVE-2018-19060 -- <email address hidden> (Leonidas S. Barbosa) Fri, 30 Nov 2018 14:36:01 -0300
Available diffs
poppler (0.41.0-0ubuntu1.9) xenial-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-19149.patch: "check whether and embedded file is actually present in the PDF and show warning in that case" in glib/poppler-attachment.cc, glib/poppler-document.cc. - CVE-2018-19149 [ Marc Deslauriers ] * SECURITY UPDATE: infinite recursion via crafted file - debian/patches/CVE-2018-16646.patch: avoid cycles in PDF parsing in poppler/Parser.cc, poppler/XRef.h. - CVE-2018-16646 * SECURITY UPDATE: denial of service via reachable abort - debian/patches/CVE-2018-19058.patch: check for stream before calling stream methods when saving an embedded file in poppler/FileSpec.cc. - CVE-2018-19058 * SECURITY UPDATE: denial of service via out-of-bounds read - debian/patches/CVE-2018-19059.patch: check for valid embedded file before trying to save it in utils/pdfdetach.cc. - CVE-2018-19059 * SECURITY UPDATE: denial of service via NULL pointer dereference - debian/patches/CVE-2018-19060.patch: check for valid file name of embedded file in utils/pdfdetach.cc. - CVE-2018-19060 -- <email address hidden> (Leonidas S. Barbosa) Fri, 30 Nov 2018 14:07:17 -0300
Available diffs
poppler (0.24.5-2ubuntu4.13) trusty-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-19149.patch: "check whether and embedded file is actually present in the PDF and show warning in that case" in glib/poppler-attachment.cc, glib/poppler-document.cc. - CVE-2018-19149 [ Marc Deslauriers ] * SECURITY UPDATE: infinite recursion via crafted file - debian/patches/CVE-2018-16646.patch: avoid cycles in PDF parsing in poppler/Parser.cc, poppler/XRef.h. - CVE-2018-16646 * SECURITY UPDATE: denial of service via reachable abort - debian/patches/CVE-2018-19058.patch: check for stream before calling stream methods when saving an embedded file in poppler/FileSpec.cc. - CVE-2018-19058 * SECURITY UPDATE: denial of service via out-of-bounds read - debian/patches/CVE-2018-19059.patch: check for valid embedded file before trying to save it in utils/pdfdetach.cc. - CVE-2018-19059 * SECURITY UPDATE: denial of service via NULL pointer dereference - debian/patches/CVE-2018-19060.patch: check for valid file name of embedded file in utils/pdfdetach.cc. - CVE-2018-19060 -- <email address hidden> (Leonidas S. Barbosa) Fri, 30 Nov 2018 13:07:28 -0300
Deleted in bionic-proposed (Reason: moved to -updates) |
poppler (0.62.0-2ubuntu2.3) bionic; urgency=medium * debian/patches/git_embed_segfault.patch: - "Check whether an embedded file is actually present in the PDF and show warning in that case." (lp: #1803059) -- Sebastien Bacher <email address hidden> Fri, 23 Nov 2018 11:07:19 +0100
Available diffs
Deleted in cosmic-proposed (Reason: moved to -updates) |
poppler (0.68.0-0ubuntu1.1) cosmic; urgency=medium * debian/patches/git_embed_segfault.patch: - "Check whether an embedded file is actually present in the PDF and show warning in that case." (lp: #1803059) -- Sebastien Bacher <email address hidden> Fri, 23 Nov 2018 16:01:35 +0100
Available diffs
poppler (0.71.0-0ubuntu3) disco; urgency=medium * Re-upload the 0.71 update which was deleted from disco-proposed to not get in the way of other transitions (lp: #1796717) - include a fix for a crash due to missing embedded file (lp: #1803059)
Available diffs
- diff from 0.68.0-0ubuntu1 to 0.71.0-0ubuntu3 (429.4 KiB)
- diff from 0.71.0-0ubuntu2 to 0.71.0-0ubuntu3 (434 bytes)
Deleted in disco-proposed (Reason: don't entangle more transitions) |
poppler (0.71.0-0ubuntu2) disco; urgency=medium * Declare some symbols optional to fix the build -- Sebastien Bacher <email address hidden> Thu, 15 Nov 2018 11:30:22 +0100
Available diffs
- diff from 0.71.0-0ubuntu1 to 0.71.0-0ubuntu2 (744 bytes)
Superseded in disco-proposed |
poppler (0.71.0-0ubuntu1) disco; urgency=medium * New upstream version * Changed the binary name according to the soname update * Updated the symbols
Available diffs
- diff from 0.68.0-0ubuntu1 to 0.71.0-0ubuntu1 (429.3 KiB)
poppler (0.62.0-2ubuntu2.2) bionic-security; urgency=medium * SECURITY UPDATE: Out of bounds read - debian/patches/CVE-2018-13988.patch: fix in poppler/Parser.cc. - CVE-2018-13988 -- <email address hidden> (Leonidas S. Barbosa) Tue, 28 Aug 2018 10:49:09 -0300
Available diffs
- diff from 0.62.0-2ubuntu2.1 to 0.62.0-2ubuntu2.2 (897 bytes)
poppler (0.41.0-0ubuntu1.8) xenial-security; urgency=medium * SECURITY UPDATE: Out of bounds read - debian/patches/CVE-2018-13988.patch: fix in poppler/Parser.cc. - CVE-2018-13988 -- <email address hidden> (Leonidas S. Barbosa) Mon, 27 Aug 2018 14:02:34 -0300
Available diffs
- diff from 0.41.0-0ubuntu1.7 to 0.41.0-0ubuntu1.8 (933 bytes)
poppler (0.24.5-2ubuntu4.12) trusty-security; urgency=medium * SECURITY UPDATE: Out of bounds read - debian/patches/CVE-2018-13988.patch: fix in poppler/Parser.cc. - CVE-2018-13988 -- <email address hidden> (Leonidas S. Barbosa) Mon, 27 Aug 2018 12:10:48 -0300
Available diffs
Superseded in disco-release |
Obsolete in cosmic-release |
Deleted in cosmic-proposed (Reason: moved to release) |
poppler (0.68.0-0ubuntu1) cosmic; urgency=medium * New upstream version - TextPage: Add horizontal scaling to font matrix (lp: #1761567) * Updated for the soname change libpoppler73 -> 79 * debian/patches/proper-init.patch: - removed, the issue has been fixed upstream in another way since * debian/patches/01-new-gtk-doc.patch, debian/patches/cairo-good-filter.patch, debian/patches/CVE-2017-18267.patch: - removed, the fixes are in the new version * debian/patches/series: - added a comment about the remaining patches -- Sebastien Bacher <email address hidden> Wed, 22 Aug 2018 11:30:47 +0200
Available diffs
- diff from 0.62.0-2ubuntu3 to 0.68.0-0ubuntu1 (352.9 KiB)
poppler (0.62.0-2ubuntu3) cosmic; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2017-18267.patch: fix issue for malformed documents in fofi/FoFiType1C.cc. - CVE-2017-18267 -- <email address hidden> (Leonidas S. Barbosa) Wed, 16 May 2018 13:30:19 -0300
Available diffs
poppler (0.24.5-2ubuntu4.11) trusty-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2017-18267.patch: fix issue for malformed documents in fofi/FoFiType1C.cc. - CVE-2017-18267 * SECURITY UPDATE: Null dereference - debian/patches/CVE-2018-10768.patch: draw for malformed docs in poppler/Annot.c. - CVE-2018-10768 -- <email address hidden> (Leonidas S. Barbosa) Mon, 14 May 2018 11:18:01 -0300
Available diffs
poppler (0.41.0-0ubuntu1.7) xenial-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2017-18267.patch: fix issue for malformed documents in fofi/FoFiType1C.cc. - CVE-2017-18267 -- <email address hidden> (Leonidas S. Barbosa) Mon, 14 May 2018 12:00:46 -0300
Available diffs
poppler (0.57.0-2ubuntu4.3) artful-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2017-18267.patch: fix issue for malformed documents in fofi/FoFiType1C.cc. - CVE-2017-18267 -- <email address hidden> (Leonidas S. Barbosa) Mon, 14 May 2018 12:43:51 -0300
Available diffs
poppler (0.62.0-2ubuntu2.1) bionic-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2017-18267.patch: fix issue for malformed documents in fofi/FoFiType1C.cc. - CVE-2017-18267 -- <email address hidden> (Leonidas S. Barbosa) Mon, 14 May 2018 12:44:58 -0300
Available diffs
Superseded in cosmic-release |
Published in bionic-release |
Deleted in bionic-proposed (Reason: moved to release) |
poppler (0.62.0-2ubuntu2) bionic; urgency=medium * Cherry-pick cairo-good-filter.patch from 0.63: Use cairo's GOOD filter instead of BEST to significantly improve performance. Thanks Rogério Brito for suggesting this patch. (Closes: #895487) (LP: #1763874) -- Jeremy Bicha <email address hidden> Fri, 13 Apr 2018 22:08:42 -0400
Available diffs
poppler (0.62.0-2ubuntu1) bionic; urgency=low * Merge with Debian; remaining changes: - d/p/proper-init.patch: Fix thumbnailer crash - d/rules: Use --enable-libopenjpeg=unmaintained, it's in universe - debian/patches/CVE-2017-2820.patch: check for overflow in poppler/JPXStream.cc. - debian/patches/CVE-2017-9083.patch: check nComps in poppler/JPXStream.cc.
Available diffs
poppler (0.62.0-1ubuntu1) bionic; urgency=medium * Merge with Debian; remaining changes: - d/p/proper-init.patch: Fix thumbnailer crash - d/rules: Use --enable-libopenjpeg=unmaintained, it's in universe - debian/patches/CVE-2017-2820.patch: check for overflow in poppler/JPXStream.cc. - debian/patches/CVE-2017-9083.patch: check nComps in poppler/JPXStream.cc.
Available diffs
poppler (0.57.0-2ubuntu4.2) artful-security; urgency=medium * SECURITY UPDATE: fails to validate boundaries in TextPool::addWord leading to overflow - debian/patches/CVE-2017-1000456.patch: fix crash in fuzzed file in poppler/TextOutputDev.cc. - CVE-2017-1000456 -- <email address hidden> (Leonidas S. Barbosa) Thu, 04 Jan 2018 17:19:45 -0300
Available diffs
poppler (0.48.0-2ubuntu2.5) zesty-security; urgency=medium * SECURITY UPDATE: fails to validate boundaries in TextPool::addWord leading to overflow - debian/patches/CVE-2017-1000456.patch: fix crash in fuzzed file in poppler/TextOutputDev.cc. - CVE-2017-1000456 * SECURITY UPDATE: has a heap-based buffer over-read vulnerability - debian/patches/CVE-2017-14976.patch: fix crash in broken files in fofi/FoFiType1C.cc. - CVE-2017-14976 -- <email address hidden> (Leonidas S. Barbosa) Thu, 04 Jan 2018 14:34:55 -0300
Available diffs
poppler (0.41.0-0ubuntu1.6) xenial-security; urgency=medium * SECURITY UPDATE: fails to validate boundaries in TextPool::addWord leading to overflow - debian/patches/CVE-2017-1000456.patch: fix crash in fuzzed file in poppler/TextOutputDev.cc. - CVE-2017-1000456 * SECURITY UPDATE: has a heap-based buffer over-read vulnerability - debian/patches/CVE-2017-14976.patch: fix crash in broken files in fofi/FoFiType1C.cc. - CVE-2017-14976 -- <email address hidden> (Leonidas S. Barbosa) Thu, 04 Jan 2018 13:58:32 -0300
Available diffs
poppler (0.24.5-2ubuntu4.9) trusty-security; urgency=medium * SECURITY UPDATE: fails to validate boundaries in TextPool::addWord leading to overflow - debian/patches/CVE-2017-1000456.patch: fix crash in fuzzed file in poppler/TextOutputDev.cc. - CVE-2017-1000456 * SECURITY UPDATE: has a heap-based buffer over-read vulnerability - debian/patches/CVE-2017-14976.patch: fix crash in broken files in fofi/FoFiType1C.cc. - CVE-2017-14976 -- <email address hidden> (Leonidas S. Barbosa) Thu, 04 Jan 2018 13:49:42 -0300
Available diffs
poppler (0.57.0-2ubuntu5) bionic; urgency=medium * SECURITY UPDATE: pointer dereference can cause a DoS attack - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by a dereference pointer in poppler/CairoOutputDev.cc. - CVE-2017-15565 -- <email address hidden> (Leonidas S. Barbosa) Thu, 26 Oct 2017 11:14:37 -0300
Available diffs
- diff from 0.57.0-2ubuntu4 to 0.57.0-2ubuntu5 (893 bytes)
poppler (0.24.5-2ubuntu4.8) trusty-security; urgency=medium * SECURITY UPDATE: pointer dereference can cause a DoS attack - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by a dereference pointer in poppler/CairoOutputDev.cc. - CVE-2017-15565 -- <email address hidden> (Leonidas S. Barbosa) Thu, 26 Oct 2017 11:22:42 -0300
Available diffs
- diff from 0.24.5-2ubuntu4.7 to 0.24.5-2ubuntu4.8 (968 bytes)
poppler (0.48.0-2ubuntu2.4) zesty-security; urgency=medium * SECURITY UPDATE: pointer dereference can cause a DoS attack - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by a dereference pointer in poppler/CairoOutputDev.cc. - CVE-2017-15565 -- <email address hidden> (Leonidas S. Barbosa) Thu, 26 Oct 2017 11:18:06 -0300
Available diffs
- diff from 0.48.0-2ubuntu2.3 to 0.48.0-2ubuntu2.4 (909 bytes)
poppler (0.57.0-2ubuntu4.1) artful-security; urgency=medium * SECURITY UPDATE: pointer dereference can cause a DoS attack - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by a dereference pointer in poppler/CairoOutputDev.cc. - CVE-2017-15565 -- <email address hidden> (Leonidas S. Barbosa) Thu, 26 Oct 2017 11:14:37 -0300
Available diffs
poppler (0.41.0-0ubuntu1.5) xenial-security; urgency=medium * SECURITY UPDATE: pointer dereference can cause a DoS attack - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by a dereference pointer in poppler/CairoOutputDev.cc. - CVE-2017-15565 -- <email address hidden> (Leonidas S. Barbosa) Thu, 26 Oct 2017 11:20:13 -0300
Available diffs
- diff from 0.41.0-0ubuntu1.4 to 0.41.0-0ubuntu1.5 (925 bytes)
Superseded in bionic-release |
Obsolete in artful-release |
Deleted in artful-proposed (Reason: moved to release) |
poppler (0.57.0-2ubuntu4) artful; urgency=medium * SECURITY UPDATE: Floating point exception - debian/patches/CVE-2017-14518.patch: Fix divide by 0 on broken documents in splash/Splash.cc. - CVE-2017-14518 * SECURITY UPDATE: Floating point exception - debian/patches/CVE-2017-14520.patch: don't try to scale if srcHeight or srcWidth is less than 1 in splash/Splash.cc. - CVE-2017-14520 * SECURITY UPDATE: Floating point exception in ImageStream - debian/patches/CVE-2017-14617.patch: Fix crash in broken files in poppler/Stream.cc. - CVE-2017-14617 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14926.patch: Fix crash on broken files in poppler/Annot.cc. - CVE-2017-14926 * SECURITY UPDATE: NULL pointer dereferencem - debian/patches/CVE-2017-14927.patch: Fix crash in broken files in poppler/SplashOutputDev.cc - CVE-2017-14927 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14928.patch: Fix crash broken files in poppler/Annot.cc. - CVE-2017-14928 * SECURITY UPDATE: Memory corruption - debian/patches/CVE-2017-14929.patch: Fix infinite recursion in poppler/Gfx.cc, poppler/GfxState.cc, poppler/GfxState.h. - CVE-2017-14929 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14975.patch: fix crash in convertToType0 in fofi/FoFiType1C.cc. - CVE-2017-14975 * SECURITY UPDATE: heap-based buffer over-read - debian/patches/CVE-2017-14976.patch: fix crash in convertToType0 in fofi/FoFiType1C.cc. - CVE-2017-14976 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14977.patch: fix NULL deference pointer in fofi/FoFiTrueType.cc. - CVE-2017-14977 -- <email address hidden> (Leonidas S. Barbosa) Thu, 05 Oct 2017 15:20:07 -0300
Available diffs
poppler (0.57.0-2ubuntu3) artful; urgency=medium * debian/rules: - build with --enable-libopenjpeg=unmaintained which makes the poppler openjpeg parser used as it was in Ubuntu until now. Upstream doesn't recommend that but the libopenjpeg MIR has still not been approved and without a parser some documents are rendered as blank. (lp: #1714596) -- Sebastien Bacher <email address hidden> Mon, 09 Oct 2017 19:31:17 +0200
Available diffs
- diff from 0.57.0-2ubuntu2 to 0.57.0-2ubuntu3 (620 bytes)
poppler (0.24.5-2ubuntu4.7) trusty-security; urgency=medium * SECURITY UPDATE: Floating point exception - debian/patches/CVE-2017-14518.patch: Fix divide by 0 on broken documents in splash/Splash.cc. - CVE-2017-14518 * SECURITY UPDATE: Floating point exception - debian/patches/CVE-2017-14520.patch: don't try to scale if srcHeight or srcWidth is less than 1 in splash/Splash.cc. - CVE-2017-14520 * SECURITY UPDATE: Floating point exception in ImageStream - debian/patches/CVE-2017-14617.patch: Fix crash in broken files in poppler/Stream.cc. - CVE-2017-14617 * SECURITY UPDATE: Memory corruption - debian/patches/CVE-2017-14929.patch: Fix infinite recursion in poppler/Gfx.cc, poppler/GfxState.cc, poppler/GfxState.h. - CVE-2017-14929 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14975.patch: fix crash in convertToType0 in fofi/FoFiType1C.cc. - CVE-2017-14975 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14977.patch: fix NULL deference pointer in fofi/FoFiTrueType.cc. - CVE-2017-14977 * SECURITY UPDATE: Integer overflow and heap overflow - debian/patches/CVE-2017-9776.patch: fix malformed documents in poppler/JBIG2Stream.cc. - CVE-2017-9776 -- <email address hidden> (Leonidas S. Barbosa) Wed, 04 Oct 2017 12:51:10 -0300
Available diffs
poppler (0.41.0-0ubuntu1.4) xenial-security; urgency=medium * SECURITY UPDATE: Floating point exception - debian/patches/CVE-2017-14518.patch: Fix divide by 0 on broken documents in splash/Splash.cc. - CVE-2017-14518 * SECURITY UPDATE: Floating point exception - debian/patches/CVE-2017-14520.patch: don't try to scale if srcHeight or srcWidth is less than 1 in splash/Splash.cc. - CVE-2017-14520 * SECURITY UPDATE: Floating point exception in ImageStream - debian/patches/CVE-2017-14617.patch: Fix crash in broken files in poppler/Stream.cc. - CVE-2017-14617 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14926.patch: Fix crash on broken files in poppler/Annot.cc. - CVE-2017-14926 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14928.patch: Fix crash broken files in poppler/Annot.cc. - CVE-2017-14928 * SECURITY UPDATE: Memory corruption - debian/patches/CVE-2017-14929.patch: Fix infinite recursion in poppler/Gfx.cc, poppler/GfxState.cc, poppler/GfxState.h. - CVE-2017-14929 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14975.patch: fix crash in convertToType0 in fofi/FoFiType1C.cc. - CVE-2017-14975 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14977.patch: fix NULL deference pointer in fofi/FoFiTrueType.cc. - CVE-2017-14977 * SECURITY UPDATE: Integer overflow and heap overflow - debian/patches/CVE-2017-9776.patch: fix malformed documents in poppler/JBIG2Stream.cc. - CVE-2017-9776 -- <email address hidden> (Leonidas S. Barbosa) Wed, 04 Oct 2017 12:12:46 -0300
Available diffs
poppler (0.48.0-2ubuntu2.3) zesty-security; urgency=medium * SECURITY UPDATE: Floating point exception - debian/patches/CVE-2017-14518.patch: Fix divide by 0 on broken documents in splash/Splash.cc. - CVE-2017-14518 * SECURITY UPDATE: Floating point exception - debian/patches/CVE-2017-14520.patch: don't try to scale if srcHeight or srcWidth is less than 1 in splash/Splash.cc. - CVE-2017-14520 * SECURITY UPDATE: Floating point exception in ImageStream - debian/patches/CVE-2017-14617.patch: Fix crash in broken files in poppler/Stream.cc. - CVE-2017-14617 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14926.patch: Fix crash on broken files in poppler/Annot.cc. - CVE-2017-14926 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14928.patch: Fix crash broken files in poppler/Annot.cc. - CVE-2017-14928 * SECURITY UPDATE: Memory corruption - debian/patches/CVE-2017-14929.patch: Fix infinite recursion in poppler/Gfx.cc, poppler/GfxState.cc, poppler/GfxState.h. - CVE-2017-14929 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14975.patch: fix crash in convertToType0 in fofi/FoFiType1C.cc. - CVE-2017-14975 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2017-14977.patch: fix NULL deference pointer in fofi/FoFiTrueType.cc. - CVE-2017-14977 * SECURITY UPDATE: Integer overflow and heap overflow - debian/patches/CVE-2017-9776.patch: fix malformed documents in poppler/JBIG2Stream.cc. - CVE-2017-9776 -- <email address hidden> (Leonidas S. Barbosa) Wed, 04 Oct 2017 12:07:29 -0300
Available diffs
poppler (0.57.0-2ubuntu2) artful; urgency=medium * SECURITY UPDATE: NULL Pointer Dereference - debian/patches/CVE-2017-14517.patch: Fix crash in broken file in poppler/XRef.cc. - CVE-2017-14517 * SECURITY UPDATE: Memory corruption - infinite loop - debian/patches/CVE-2017-14519.patch: fix infinite recursion in poppler/Gfx.cc, poppler/Gfx.h, poppler/GfxFont.cc, poppler/GfxFont.h - CVE-2017-14519 -- <email address hidden> (Leonidas S. Barbosa) Fri, 29 Sep 2017 15:02:15 -0300
Available diffs
poppler (0.41.0-0ubuntu1.3) xenial-security; urgency=medium * SECURITY UPDATE: Memory corruption - infinite loop - debian/patches/CVE-2017-14519.patch: fix infinite recursion in poppler/Gfx.cc, poppler/Gfx.h, poppler/GfxFont.cc, poppler/GfxFont.h - CVE-2017-14519 -- <email address hidden> (Leonidas S. Barbosa) Fri, 29 Sep 2017 12:30:32 -0300
Available diffs
poppler (0.24.5-2ubuntu4.6) trusty-security; urgency=medium * SECURITY UPDATE: Memory corruption - infinite loop - debian/patches/CVE-2017-14519.patch: fix infinite recursion in poppler/Gfx.cc, poppler/Gfx.h, poppler/GfxFont.cc, poppler/GfxFont.h - CVE-2017-14519 -- <email address hidden> (Leonidas S. Barbosa) Fri, 29 Sep 2017 12:25:36 -0300
Available diffs
poppler (0.48.0-2ubuntu2.2) zesty-security; urgency=medium * SECURITY UPDATE: NULL Pointer Dereference - debian/patches/CVE-2017-14517.patch: Fix crash in broken file in poppler/XRef.cc. - CVE-2017-14517 * SECURITY UPDATE: Memory corruption - infinite loop - debian/patches/CVE-2017-14519.patch: fix infinite recursion in poppler/Gfx.cc, poppler/Gfx.h, poppler/GfxFont.cc, poppler/GfxFont.h - CVE-2017-14519 -- <email address hidden> (Leonidas S. Barbosa) Fri, 29 Sep 2017 10:41:15 -0300
Available diffs
poppler (0.57.0-2ubuntu1) artful; urgency=medium * Merge from Debian unstable. Remaining changes: - d/p/proper-init.patch: Fix thumbnailer crash - d/rules: Use --enable-libopenjpeg=none, it's in universe - debian/patches/CVE-2017-2820.patch: check for overflow in poppler/JPXStream.cc. - debian/patches/CVE-2017-9083.patch: check nComps in poppler/JPXStream.cc.
Available diffs
poppler (0.57.0-0ubuntu2) artful; urgency=medium * Pass --enable-libopenjpeg1=none, the correct way to disable openjpeg build now; and drop unused build-dependency on openjpeg2. -- Steve Langasek <email address hidden> Wed, 09 Aug 2017 21:49:06 -0700
Available diffs
- diff from 0.48.0-2ubuntu3 to 0.57.0-0ubuntu2 (124.4 KiB)
- diff from 0.57.0-0ubuntu1 to 0.57.0-0ubuntu2 (581 bytes)
Superseded in artful-proposed |
poppler (0.57.0-0ubuntu1) artful; urgency=medium * New upstream release * Drop patches which are included upstream - upstream_pdfseparate-remove-extra-in-error-message.patch - CVE-2017-7511.patch - CVE-2017-9406.patch - CVE-2017-9408.patch - CVE-2017-9775.patch - CVE-2017-7515.patch * Refresh patches as needed * Pass --disable-libopenjpeg1 and --disable-libopenjpeg2 which replaced --disable-libopenjpeg * Rename packages according to the new SONAMEs: - libpoppler64 -> libpoppler68 * Update symbols files -- Rico Tzschichholz <email address hidden> Tue, 01 Aug 2017 14:16:06 +0200
Available diffs
- diff from 0.48.0-2ubuntu3 to 0.57.0-0ubuntu1 (124.2 KiB)
poppler (0.48.0-2ubuntu3) artful; urgency=medium * SECURITY UPDATE: NULL pointer dereference in pdfunite - debian/patches/CVE-2017-7511.patch: add extra checks to utils/pdfunite.cc. - CVE-2017-7511 * SECURITY UPDATE: uncontrolled recursion in pdfunite - debian/patches/CVE-2017-7515.patch: fix recursion in poppler/PDFDoc.cc, poppler/PDFDoc.h. - CVE-2017-7515 * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte - debian/patches/CVE-2017-9083.patch: check nComps in poppler/JPXStream.cc. - CVE-2017-9083 * SECURITY UPDATE: memory leak in gmalloc - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc. - CVE-2017-9406 * SECURITY UPDATE: memory leak in Object::initArray - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc. - CVE-2017-9408 * SECURITY UPDATE: stack buffer overflow in GfxState.cc - debian/patches/CVE-2017-9775.patch: add extra checks to poppler/GfxState.cc. - CVE-2017-9775 * SECURITY UPDATE: integer overflow in JPXStream::readTilePart - debian/patches/CVE-2017-2820.patch: check for overflow in poppler/JPXStream.cc. - CVE-2017-2820 -- Marc Deslauriers <email address hidden> Thu, 06 Jul 2017 08:52:45 -0400
Available diffs
poppler (0.48.0-2ubuntu2.1) zesty-security; urgency=medium * SECURITY UPDATE: NULL pointer dereference in pdfunite - debian/patches/CVE-2017-7511.patch: add extra checks to utils/pdfunite.cc. - CVE-2017-7511 * SECURITY UPDATE: uncontrolled recursion in pdfunite - debian/patches/CVE-2017-7515.patch: fix recursion in poppler/PDFDoc.cc, poppler/PDFDoc.h. - CVE-2017-7515 * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte - debian/patches/CVE-2017-9083.patch: check nComps in poppler/JPXStream.cc. - CVE-2017-9083 * SECURITY UPDATE: memory leak in gmalloc - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc. - CVE-2017-9406 * SECURITY UPDATE: memory leak in Object::initArray - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc. - CVE-2017-9408 * SECURITY UPDATE: stack buffer overflow in GfxState.cc - debian/patches/CVE-2017-9775.patch: add extra checks to poppler/GfxState.cc. - CVE-2017-9775 * SECURITY UPDATE: integer overflow in JPXStream::readTilePart - debian/patches/CVE-2017-2820.patch: check for overflow in poppler/JPXStream.cc. - CVE-2017-2820 -- Marc Deslauriers <email address hidden> Thu, 06 Jul 2017 08:52:45 -0400
Available diffs
poppler (0.44.0-3ubuntu2.1) yakkety-security; urgency=medium * SECURITY UPDATE: NULL pointer dereference in pdfunite - debian/patches/CVE-2017-7511.patch: add extra checks to utils/pdfunite.cc. - CVE-2017-7511 * SECURITY UPDATE: uncontrolled recursion in pdfunite - debian/patches/CVE-2017-7515.patch: fix recursion in poppler/PDFDoc.cc, poppler/PDFDoc.h. - CVE-2017-7515 * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte - debian/patches/CVE-2017-9083.patch: check nComps in poppler/JPXStream.cc. - CVE-2017-9083 * SECURITY UPDATE: memory leak in gmalloc - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc. - CVE-2017-9406 * SECURITY UPDATE: memory leak in Object::initArray - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc. - CVE-2017-9408 * SECURITY UPDATE: stack buffer overflow in GfxState.cc - debian/patches/CVE-2017-9775.patch: add extra checks to poppler/GfxState.cc. - CVE-2017-9775 * SECURITY UPDATE: integer overflow in JPXStream::readTilePart - debian/patches/CVE-2017-2820.patch: check for overflow in poppler/JPXStream.cc. - CVE-2017-2820 -- Marc Deslauriers <email address hidden> Thu, 06 Jul 2017 10:59:00 -0400
Available diffs
poppler (0.41.0-0ubuntu1.2) xenial-security; urgency=medium * SECURITY UPDATE: NULL pointer dereference in pdfunite - debian/patches/CVE-2017-7511.patch: add extra checks to utils/pdfunite.cc. - CVE-2017-7511 * SECURITY UPDATE: uncontrolled recursion in pdfunite - debian/patches/CVE-2017-7515.patch: fix recursion in poppler/PDFDoc.cc, poppler/PDFDoc.h. - CVE-2017-7515 * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte - debian/patches/CVE-2017-9083.patch: check nComps in poppler/JPXStream.cc. - CVE-2017-9083 * SECURITY UPDATE: memory leak in gmalloc - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc. - CVE-2017-9406 * SECURITY UPDATE: memory leak in Object::initArray - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc. - CVE-2017-9408 * SECURITY UPDATE: stack buffer overflow in GfxState.cc - debian/patches/CVE-2017-9775.patch: add extra checks to poppler/GfxState.cc. - CVE-2017-9775 * SECURITY UPDATE: integer overflow in JPXStream::readTilePart - debian/patches/CVE-2017-2820.patch: check for overflow in poppler/JPXStream.cc. - CVE-2017-2820 -- Marc Deslauriers <email address hidden> Thu, 06 Jul 2017 11:27:07 -0400
Available diffs
poppler (0.24.5-2ubuntu4.5) trusty-security; urgency=medium * SECURITY UPDATE: NULL pointer dereference in pdfunite - debian/patches/CVE-2017-7511.patch: add extra checks to utils/pdfunite.cc. - CVE-2017-7511 * SECURITY UPDATE: uncontrolled recursion in pdfunite - debian/patches/CVE-2017-7515.patch: fix recursion in poppler/PDFDoc.cc, poppler/PDFDoc.h. - CVE-2017-7515 * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte - debian/patches/CVE-2017-9083.patch: check nComps in poppler/JPXStream.cc. - CVE-2017-9083 * SECURITY UPDATE: memory leak in gmalloc - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc. - CVE-2017-9406 * SECURITY UPDATE: memory leak in Object::initArray - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc. - CVE-2017-9408 * SECURITY UPDATE: stack buffer overflow in GfxState.cc - debian/patches/CVE-2017-9775.patch: add extra checks to poppler/GfxState.cc. - CVE-2017-9775 * SECURITY UPDATE: integer overflow in JPXStream::readTilePart - debian/patches/CVE-2017-2820.patch: check for overflow in poppler/JPXStream.cc. - CVE-2017-2820 -- Marc Deslauriers <email address hidden> Thu, 06 Jul 2017 11:40:22 -0400
Available diffs
Superseded in artful-release |
Obsolete in zesty-release |
Deleted in zesty-proposed (Reason: moved to release) |
poppler (0.48.0-2ubuntu2) zesty; urgency=medium * No-change rebuild against libnspr4 -- Andy Whitcroft <email address hidden> Fri, 24 Feb 2017 11:15:23 +0000
Available diffs
- diff from 0.48.0-2ubuntu1 to 0.48.0-2ubuntu2 (343 bytes)
poppler (0.48.0-2ubuntu1) zesty; urgency=low * Merge from Debian unstable (LP: #1639478). Remaining changes: - d/p/proper-init.patch: Fix thumbnailer crash - d/rules: Use --disable-libopenjpeg, it's in universe
Available diffs
- diff from 0.44.0-3ubuntu3 to 0.48.0-2ubuntu1 (512.9 KiB)
poppler (0.44.0-3ubuntu3) zesty; urgency=medium * debian/patches/proper-init.patch: - Fix crashes in atril's and evince's thumbnailers on some PDFs (LP: #1635812). Patch by Marek Kasik. -- Vlad Orlov <email address hidden> Sun, 23 Oct 2016 21:04:55 +0300
Available diffs
poppler (0.41.0-0ubuntu1.1) xenial; urgency=medium * debian/patches/fix-fillToStrokePathClip-crash-and-rendering.patch - Fix crash in _cairo_gstate_set_dash (LP: #1610714) -- Jean-Louis Dupond <email address hidden> Sun, 07 Aug 2016 18:45:07 +0200
Available diffs
Superseded in zesty-release |
Obsolete in yakkety-release |
Deleted in yakkety-proposed (Reason: moved to release) |
poppler (0.44.0-3ubuntu2) yakkety; urgency=medium * Fix build with Qt 5.6. (LP: #1608476) -- Timo Jyrinki <email address hidden> Mon, 01 Aug 2016 13:45:28 +0300
Available diffs
- diff from 0.44.0-3ubuntu1 to 0.44.0-3ubuntu2 (565 bytes)
76 → 150 of 377 results | First • Previous • Next • Last |