Change log for poppler package in Ubuntu

175 of 254 results
Published in bionic-release on 2017-11-12
Deleted in bionic-proposed (Reason: moved to release)
poppler (0.57.0-2ubuntu5) bionic; urgency=medium

  * SECURITY UPDATE: pointer dereference can cause a DoS attack
    - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by
      a dereference pointer in poppler/CairoOutputDev.cc.
    - CVE-2017-15565

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 26 Oct 2017 11:14:37 -0300

Available diffs

Published in trusty-updates on 2017-10-30
Published in trusty-security on 2017-10-30
poppler (0.24.5-2ubuntu4.8) trusty-security; urgency=medium

  * SECURITY UPDATE: pointer dereference can cause a DoS attack
    - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by
      a dereference pointer in poppler/CairoOutputDev.cc.
    - CVE-2017-15565

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 26 Oct 2017 11:22:42 -0300
Published in zesty-updates on 2017-10-30
Published in zesty-security on 2017-10-30
poppler (0.48.0-2ubuntu2.4) zesty-security; urgency=medium

  * SECURITY UPDATE: pointer dereference can cause a DoS attack
    - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by
      a dereference pointer in poppler/CairoOutputDev.cc.
    - CVE-2017-15565

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 26 Oct 2017 11:18:06 -0300
Published in artful-updates on 2017-10-30
Published in artful-security on 2017-10-30
poppler (0.57.0-2ubuntu4.1) artful-security; urgency=medium

  * SECURITY UPDATE: pointer dereference can cause a DoS attack
    - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by
      a dereference pointer in poppler/CairoOutputDev.cc.
    - CVE-2017-15565

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 26 Oct 2017 11:14:37 -0300
Published in xenial-updates on 2017-10-30
Published in xenial-security on 2017-10-30
poppler (0.41.0-0ubuntu1.5) xenial-security; urgency=medium

  * SECURITY UPDATE: pointer dereference can cause a DoS attack
    - debian/patches/CVE-2017-15565.patch: fix crash in broken files caused by
      a dereference pointer in poppler/CairoOutputDev.cc.
    - CVE-2017-15565

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 26 Oct 2017 11:20:13 -0300
Superseded in bionic-release on 2017-11-12
Published in artful-release on 2017-10-10
Deleted in artful-proposed (Reason: moved to release)
poppler (0.57.0-2ubuntu4) artful; urgency=medium

  * SECURITY UPDATE: Floating point exception
    - debian/patches/CVE-2017-14518.patch: Fix divide by 0 on broken
      documents in splash/Splash.cc.
    - CVE-2017-14518
  * SECURITY UPDATE: Floating point exception
    - debian/patches/CVE-2017-14520.patch: don't try to scale if srcHeight or
      srcWidth is less than 1 in splash/Splash.cc.
    - CVE-2017-14520
  * SECURITY UPDATE: Floating point exception in ImageStream
    - debian/patches/CVE-2017-14617.patch: Fix crash in broken files in
      poppler/Stream.cc.
    - CVE-2017-14617
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14926.patch: Fix crash on broken files
      in poppler/Annot.cc.
    - CVE-2017-14926
  * SECURITY UPDATE: NULL pointer dereferencem
    - debian/patches/CVE-2017-14927.patch: Fix crash in broken files in
      poppler/SplashOutputDev.cc
    - CVE-2017-14927
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14928.patch: Fix crash broken files
      in poppler/Annot.cc.
    - CVE-2017-14928
  * SECURITY UPDATE: Memory corruption
    - debian/patches/CVE-2017-14929.patch: Fix infinite recursion
      in poppler/Gfx.cc, poppler/GfxState.cc, poppler/GfxState.h.
    - CVE-2017-14929
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14975.patch: fix crash in convertToType0 in
      fofi/FoFiType1C.cc.
    - CVE-2017-14975
  * SECURITY UPDATE: heap-based buffer over-read
    - debian/patches/CVE-2017-14976.patch: fix crash in convertToType0 in
      fofi/FoFiType1C.cc.
    - CVE-2017-14976
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14977.patch: fix NULL deference pointer in
      fofi/FoFiTrueType.cc.
    - CVE-2017-14977

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 05 Oct 2017 15:20:07 -0300
Superseded in artful-release on 2017-10-10
Deleted in artful-proposed on 2017-10-12 (Reason: moved to release)
poppler (0.57.0-2ubuntu3) artful; urgency=medium

  * debian/rules:
    - build with --enable-libopenjpeg=unmaintained which makes the poppler
      openjpeg parser used as it was in Ubuntu until now. Upstream doesn't
      recommend that but the libopenjpeg MIR has still not been approved and
      without a parser some documents are rendered as blank. (lp: #1714596)

 -- Sebastien Bacher <email address hidden>  Mon, 09 Oct 2017 19:31:17 +0200

Available diffs

Superseded in trusty-updates on 2017-10-30
Superseded in trusty-security on 2017-10-30
poppler (0.24.5-2ubuntu4.7) trusty-security; urgency=medium

  * SECURITY UPDATE: Floating point exception
    - debian/patches/CVE-2017-14518.patch: Fix divide by 0 on broken
      documents in splash/Splash.cc.
    - CVE-2017-14518
  * SECURITY UPDATE: Floating point exception
    - debian/patches/CVE-2017-14520.patch: don't try to scale if srcHeight or
      srcWidth is less than 1 in splash/Splash.cc.
    - CVE-2017-14520
  * SECURITY UPDATE: Floating point exception in ImageStream
    - debian/patches/CVE-2017-14617.patch: Fix crash in broken files in
      poppler/Stream.cc.
    - CVE-2017-14617
  * SECURITY UPDATE: Memory corruption
    - debian/patches/CVE-2017-14929.patch: Fix infinite recursion
      in poppler/Gfx.cc, poppler/GfxState.cc, poppler/GfxState.h.
    - CVE-2017-14929
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14975.patch: fix crash in convertToType0 in
      fofi/FoFiType1C.cc.
    - CVE-2017-14975
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14977.patch: fix NULL deference pointer in
      fofi/FoFiTrueType.cc.
    - CVE-2017-14977
  * SECURITY UPDATE: Integer overflow and heap overflow
    - debian/patches/CVE-2017-9776.patch: fix malformed documents
      in poppler/JBIG2Stream.cc.
    - CVE-2017-9776

 -- <email address hidden> (Leonidas S. Barbosa)  Wed, 04 Oct 2017 12:51:10 -0300
Superseded in xenial-updates on 2017-10-30
Superseded in xenial-security on 2017-10-30
poppler (0.41.0-0ubuntu1.4) xenial-security; urgency=medium

  * SECURITY UPDATE: Floating point exception
    - debian/patches/CVE-2017-14518.patch: Fix divide by 0 on broken
      documents in splash/Splash.cc.
    - CVE-2017-14518
  * SECURITY UPDATE: Floating point exception
    - debian/patches/CVE-2017-14520.patch: don't try to scale if srcHeight or
      srcWidth is less than 1 in splash/Splash.cc.
    - CVE-2017-14520
  * SECURITY UPDATE: Floating point exception in ImageStream
    - debian/patches/CVE-2017-14617.patch: Fix crash in broken files in
      poppler/Stream.cc.
    - CVE-2017-14617
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14926.patch: Fix crash on broken files
      in poppler/Annot.cc.
    - CVE-2017-14926
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14928.patch: Fix crash broken files
      in poppler/Annot.cc.
    - CVE-2017-14928
  * SECURITY UPDATE: Memory corruption
    - debian/patches/CVE-2017-14929.patch: Fix infinite recursion
      in poppler/Gfx.cc, poppler/GfxState.cc, poppler/GfxState.h.
    - CVE-2017-14929
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14975.patch: fix crash in convertToType0 in
      fofi/FoFiType1C.cc.
    - CVE-2017-14975
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14977.patch: fix NULL deference pointer in
      fofi/FoFiTrueType.cc.
    - CVE-2017-14977
  * SECURITY UPDATE: Integer overflow and heap overflow
    - debian/patches/CVE-2017-9776.patch: fix malformed documents
      in poppler/JBIG2Stream.cc.
    - CVE-2017-9776

 -- <email address hidden> (Leonidas S. Barbosa)  Wed, 04 Oct 2017 12:12:46 -0300
Superseded in zesty-updates on 2017-10-30
Superseded in zesty-security on 2017-10-30
poppler (0.48.0-2ubuntu2.3) zesty-security; urgency=medium

  * SECURITY UPDATE: Floating point exception
    - debian/patches/CVE-2017-14518.patch: Fix divide by 0 on broken
      documents in splash/Splash.cc.
    - CVE-2017-14518
  * SECURITY UPDATE: Floating point exception
    - debian/patches/CVE-2017-14520.patch: don't try to scale if srcHeight or
      srcWidth is less than 1 in splash/Splash.cc.
    - CVE-2017-14520
  * SECURITY UPDATE: Floating point exception in ImageStream
    - debian/patches/CVE-2017-14617.patch: Fix crash in broken files in
      poppler/Stream.cc.
    - CVE-2017-14617
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14926.patch: Fix crash on broken files
      in poppler/Annot.cc.
    - CVE-2017-14926
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14928.patch: Fix crash broken files
      in poppler/Annot.cc.
    - CVE-2017-14928
  * SECURITY UPDATE: Memory corruption
    - debian/patches/CVE-2017-14929.patch: Fix infinite recursion
      in poppler/Gfx.cc, poppler/GfxState.cc, poppler/GfxState.h.
    - CVE-2017-14929
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14975.patch: fix crash in convertToType0 in
      fofi/FoFiType1C.cc.
    - CVE-2017-14975
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2017-14977.patch: fix NULL deference pointer in
      fofi/FoFiTrueType.cc.
    - CVE-2017-14977
  * SECURITY UPDATE: Integer overflow and heap overflow
    - debian/patches/CVE-2017-9776.patch: fix malformed documents
      in poppler/JBIG2Stream.cc.
    - CVE-2017-9776

 -- <email address hidden> (Leonidas S. Barbosa)  Wed, 04 Oct 2017 12:07:29 -0300
Superseded in artful-release on 2017-10-10
Deleted in artful-proposed on 2017-10-11 (Reason: moved to release)
poppler (0.57.0-2ubuntu2) artful; urgency=medium

  * SECURITY UPDATE: NULL Pointer Dereference
    - debian/patches/CVE-2017-14517.patch: Fix crash in broken file
      in poppler/XRef.cc.
    - CVE-2017-14517
  * SECURITY UPDATE: Memory corruption - infinite loop
    - debian/patches/CVE-2017-14519.patch: fix infinite recursion in
      poppler/Gfx.cc, poppler/Gfx.h, poppler/GfxFont.cc, poppler/GfxFont.h
    - CVE-2017-14519

 -- <email address hidden> (Leonidas S. Barbosa)  Fri, 29 Sep 2017 15:02:15 -0300
Superseded in xenial-updates on 2017-10-06
Superseded in xenial-security on 2017-10-06
poppler (0.41.0-0ubuntu1.3) xenial-security; urgency=medium

  * SECURITY UPDATE: Memory corruption - infinite loop
    - debian/patches/CVE-2017-14519.patch: fix infinite recursion in
      poppler/Gfx.cc, poppler/Gfx.h, poppler/GfxFont.cc, poppler/GfxFont.h
    - CVE-2017-14519

 -- <email address hidden> (Leonidas S. Barbosa)  Fri, 29 Sep 2017 12:30:32 -0300
Superseded in trusty-updates on 2017-10-06
Superseded in trusty-security on 2017-10-06
poppler (0.24.5-2ubuntu4.6) trusty-security; urgency=medium

  * SECURITY UPDATE: Memory corruption - infinite loop
    - debian/patches/CVE-2017-14519.patch: fix infinite recursion in
      poppler/Gfx.cc, poppler/Gfx.h, poppler/GfxFont.cc, poppler/GfxFont.h
    - CVE-2017-14519

 -- <email address hidden> (Leonidas S. Barbosa)  Fri, 29 Sep 2017 12:25:36 -0300
Superseded in zesty-updates on 2017-10-06
Superseded in zesty-security on 2017-10-06
poppler (0.48.0-2ubuntu2.2) zesty-security; urgency=medium

  * SECURITY UPDATE: NULL Pointer Dereference
    - debian/patches/CVE-2017-14517.patch: Fix crash in broken file
      in poppler/XRef.cc.
    - CVE-2017-14517
  * SECURITY UPDATE: Memory corruption - infinite loop
    - debian/patches/CVE-2017-14519.patch: fix infinite recursion in
      poppler/Gfx.cc, poppler/Gfx.h, poppler/GfxFont.cc, poppler/GfxFont.h
    - CVE-2017-14519

 -- <email address hidden> (Leonidas S. Barbosa)  Fri, 29 Sep 2017 10:41:15 -0300
Superseded in artful-release on 2017-10-03
Deleted in artful-proposed on 2017-10-05 (Reason: moved to release)
poppler (0.57.0-2ubuntu1) artful; urgency=medium

  * Merge from Debian unstable.  Remaining changes:
    - d/p/proper-init.patch: Fix thumbnailer crash
    - d/rules: Use --enable-libopenjpeg=none, it's in universe
    - debian/patches/CVE-2017-2820.patch: check for overflow in
      poppler/JPXStream.cc.
    - debian/patches/CVE-2017-9083.patch: check nComps in
      poppler/JPXStream.cc.

Superseded in artful-release on 2017-09-06
Deleted in artful-proposed on 2017-09-09 (Reason: moved to release)
poppler (0.57.0-0ubuntu2) artful; urgency=medium

  * Pass --enable-libopenjpeg1=none, the correct way to disable openjpeg
    build now; and drop unused build-dependency on openjpeg2.

 -- Steve Langasek <email address hidden>  Wed, 09 Aug 2017 21:49:06 -0700
Superseded in artful-proposed on 2017-08-10
poppler (0.57.0-0ubuntu1) artful; urgency=medium

  * New upstream release
  * Drop patches which are included upstream
    - upstream_pdfseparate-remove-extra-in-error-message.patch
    - CVE-2017-7511.patch
    - CVE-2017-9406.patch
    - CVE-2017-9408.patch
    - CVE-2017-9775.patch
    - CVE-2017-7515.patch
  * Refresh patches as needed
  * Pass --disable-libopenjpeg1 and --disable-libopenjpeg2 which replaced
    --disable-libopenjpeg
  * Rename packages according to the new SONAMEs:
    - libpoppler64 -> libpoppler68
  * Update symbols files

 -- Rico Tzschichholz <email address hidden>  Tue, 01 Aug 2017 14:16:06 +0200

Available diffs

Superseded in artful-release on 2017-08-25
Deleted in artful-proposed on 2017-08-26 (Reason: moved to release)
poppler (0.48.0-2ubuntu3) artful; urgency=medium

  * SECURITY UPDATE: NULL pointer dereference in pdfunite
    - debian/patches/CVE-2017-7511.patch: add extra checks to
      utils/pdfunite.cc.
    - CVE-2017-7511
  * SECURITY UPDATE: uncontrolled recursion in pdfunite
    - debian/patches/CVE-2017-7515.patch: fix recursion in
      poppler/PDFDoc.cc, poppler/PDFDoc.h.
    - CVE-2017-7515
  * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte
    - debian/patches/CVE-2017-9083.patch: check nComps in
      poppler/JPXStream.cc.
    - CVE-2017-9083
  * SECURITY UPDATE: memory leak in gmalloc
    - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9406
  * SECURITY UPDATE: memory leak in Object::initArray
    - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9408
  * SECURITY UPDATE: stack buffer overflow in GfxState.cc
    - debian/patches/CVE-2017-9775.patch: add extra checks to
      poppler/GfxState.cc.
    - CVE-2017-9775
  * SECURITY UPDATE: integer overflow in JPXStream::readTilePart
    - debian/patches/CVE-2017-2820.patch: check for overflow in
      poppler/JPXStream.cc.
    - CVE-2017-2820

 -- Marc Deslauriers <email address hidden>  Thu, 06 Jul 2017 08:52:45 -0400
Superseded in zesty-updates on 2017-10-02
Superseded in zesty-security on 2017-10-02
poppler (0.48.0-2ubuntu2.1) zesty-security; urgency=medium

  * SECURITY UPDATE: NULL pointer dereference in pdfunite
    - debian/patches/CVE-2017-7511.patch: add extra checks to
      utils/pdfunite.cc.
    - CVE-2017-7511
  * SECURITY UPDATE: uncontrolled recursion in pdfunite
    - debian/patches/CVE-2017-7515.patch: fix recursion in
      poppler/PDFDoc.cc, poppler/PDFDoc.h.
    - CVE-2017-7515
  * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte
    - debian/patches/CVE-2017-9083.patch: check nComps in
      poppler/JPXStream.cc.
    - CVE-2017-9083
  * SECURITY UPDATE: memory leak in gmalloc
    - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9406
  * SECURITY UPDATE: memory leak in Object::initArray
    - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9408
  * SECURITY UPDATE: stack buffer overflow in GfxState.cc
    - debian/patches/CVE-2017-9775.patch: add extra checks to
      poppler/GfxState.cc.
    - CVE-2017-9775
  * SECURITY UPDATE: integer overflow in JPXStream::readTilePart
    - debian/patches/CVE-2017-2820.patch: check for overflow in
      poppler/JPXStream.cc.
    - CVE-2017-2820

 -- Marc Deslauriers <email address hidden>  Thu, 06 Jul 2017 08:52:45 -0400
Published in yakkety-updates on 2017-07-07
Published in yakkety-security on 2017-07-07
poppler (0.44.0-3ubuntu2.1) yakkety-security; urgency=medium

  * SECURITY UPDATE: NULL pointer dereference in pdfunite
    - debian/patches/CVE-2017-7511.patch: add extra checks to
      utils/pdfunite.cc.
    - CVE-2017-7511
  * SECURITY UPDATE: uncontrolled recursion in pdfunite
    - debian/patches/CVE-2017-7515.patch: fix recursion in
      poppler/PDFDoc.cc, poppler/PDFDoc.h.
    - CVE-2017-7515
  * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte
    - debian/patches/CVE-2017-9083.patch: check nComps in
      poppler/JPXStream.cc.
    - CVE-2017-9083
  * SECURITY UPDATE: memory leak in gmalloc
    - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9406
  * SECURITY UPDATE: memory leak in Object::initArray
    - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9408
  * SECURITY UPDATE: stack buffer overflow in GfxState.cc
    - debian/patches/CVE-2017-9775.patch: add extra checks to
      poppler/GfxState.cc.
    - CVE-2017-9775
  * SECURITY UPDATE: integer overflow in JPXStream::readTilePart
    - debian/patches/CVE-2017-2820.patch: check for overflow in
      poppler/JPXStream.cc.
    - CVE-2017-2820

 -- Marc Deslauriers <email address hidden>  Thu, 06 Jul 2017 10:59:00 -0400
Superseded in xenial-updates on 2017-10-02
Superseded in xenial-security on 2017-10-02
poppler (0.41.0-0ubuntu1.2) xenial-security; urgency=medium

  * SECURITY UPDATE: NULL pointer dereference in pdfunite
    - debian/patches/CVE-2017-7511.patch: add extra checks to
      utils/pdfunite.cc.
    - CVE-2017-7511
  * SECURITY UPDATE: uncontrolled recursion in pdfunite
    - debian/patches/CVE-2017-7515.patch: fix recursion in
      poppler/PDFDoc.cc, poppler/PDFDoc.h.
    - CVE-2017-7515
  * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte
    - debian/patches/CVE-2017-9083.patch: check nComps in
      poppler/JPXStream.cc.
    - CVE-2017-9083
  * SECURITY UPDATE: memory leak in gmalloc
    - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9406
  * SECURITY UPDATE: memory leak in Object::initArray
    - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9408
  * SECURITY UPDATE: stack buffer overflow in GfxState.cc
    - debian/patches/CVE-2017-9775.patch: add extra checks to
      poppler/GfxState.cc.
    - CVE-2017-9775
  * SECURITY UPDATE: integer overflow in JPXStream::readTilePart
    - debian/patches/CVE-2017-2820.patch: check for overflow in
      poppler/JPXStream.cc.
    - CVE-2017-2820

 -- Marc Deslauriers <email address hidden>  Thu, 06 Jul 2017 11:27:07 -0400
Superseded in trusty-updates on 2017-10-02
Superseded in trusty-security on 2017-10-02
poppler (0.24.5-2ubuntu4.5) trusty-security; urgency=medium

  * SECURITY UPDATE: NULL pointer dereference in pdfunite
    - debian/patches/CVE-2017-7511.patch: add extra checks to
      utils/pdfunite.cc.
    - CVE-2017-7511
  * SECURITY UPDATE: uncontrolled recursion in pdfunite
    - debian/patches/CVE-2017-7515.patch: fix recursion in
      poppler/PDFDoc.cc, poppler/PDFDoc.h.
    - CVE-2017-7515
  * SECURITY UPDATE: NULL pointer dereference in JPXStream::readUByte
    - debian/patches/CVE-2017-9083.patch: check nComps in
      poppler/JPXStream.cc.
    - CVE-2017-9083
  * SECURITY UPDATE: memory leak in gmalloc
    - debian/patches/CVE-2017-9406.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9406
  * SECURITY UPDATE: memory leak in Object::initArray
    - debian/patches/CVE-2017-9408.patch: fix leak in poppler/XRef.cc.
    - CVE-2017-9408
  * SECURITY UPDATE: stack buffer overflow in GfxState.cc
    - debian/patches/CVE-2017-9775.patch: add extra checks to
      poppler/GfxState.cc.
    - CVE-2017-9775
  * SECURITY UPDATE: integer overflow in JPXStream::readTilePart
    - debian/patches/CVE-2017-2820.patch: check for overflow in
      poppler/JPXStream.cc.
    - CVE-2017-2820

 -- Marc Deslauriers <email address hidden>  Thu, 06 Jul 2017 11:40:22 -0400
Superseded in artful-release on 2017-07-23
Published in zesty-release on 2017-02-24
Deleted in zesty-proposed (Reason: moved to release)
poppler (0.48.0-2ubuntu2) zesty; urgency=medium

  * No-change rebuild against libnspr4

 -- Andy Whitcroft <email address hidden>  Fri, 24 Feb 2017 11:15:23 +0000

Available diffs

Superseded in zesty-release on 2017-02-24
Deleted in zesty-proposed on 2017-02-25 (Reason: moved to release)
poppler (0.48.0-2ubuntu1) zesty; urgency=low

  * Merge from Debian unstable (LP: #1639478).  Remaining changes:
    - d/p/proper-init.patch: Fix thumbnailer crash
    - d/rules: Use --disable-libopenjpeg, it's in universe

Available diffs

Superseded in zesty-release on 2017-01-08
Deleted in zesty-proposed on 2017-01-10 (Reason: moved to release)
poppler (0.44.0-3ubuntu3) zesty; urgency=medium

  * debian/patches/proper-init.patch:
    - Fix crashes in atril's and evince's thumbnailers on some PDFs
      (LP: #1635812).  Patch by Marek Kasik.

 -- Vlad Orlov <email address hidden>  Sun, 23 Oct 2016 21:04:55 +0300
Superseded in xenial-updates on 2017-07-07
Deleted in xenial-proposed on 2017-07-08 (Reason: moved to -updates)
poppler (0.41.0-0ubuntu1.1) xenial; urgency=medium

  * debian/patches/fix-fillToStrokePathClip-crash-and-rendering.patch
    - Fix crash in _cairo_gstate_set_dash (LP: #1610714)

 -- Jean-Louis Dupond <email address hidden>  Sun, 07 Aug 2016 18:45:07 +0200
Superseded in zesty-release on 2016-11-23
Published in yakkety-release on 2016-08-19
Deleted in yakkety-proposed (Reason: moved to release)
poppler (0.44.0-3ubuntu2) yakkety; urgency=medium

  * Fix build with Qt 5.6. (LP: #1608476)

 -- Timo Jyrinki <email address hidden>  Mon, 01 Aug 2016 13:45:28 +0300

Available diffs

Superseded in yakkety-release on 2016-08-19
Deleted in yakkety-proposed on 2016-08-20 (Reason: moved to release)
poppler (0.44.0-3ubuntu1) yakkety; urgency=medium

  * Merge with Debian. (LP: #1591528) Remaining changes:
    - debian/control:
      + Don't build-depend on libopenjp2-7-dev since it's in universe
    - debian/rules:
      + Use --disable-libopenjpeg
  * Dropped changes:
    - Only suggest poppler-data since it's too big for CDs and
      language-selector automatically installs it after install
    - debian/patches/revert_api_change.patch:
      + revert upstream commit that removed an enum, they claim it's
        not an abi change because it's unused, but other packages (bindings)
        rely on it to build still, we can drop the patch later once the
        rdepends have been updated

Superseded in yakkety-release on 2016-07-01
Deleted in yakkety-proposed on 2016-07-03 (Reason: moved to release)
poppler (0.44.0-0ubuntu1) yakkety; urgency=medium

  * New upstream release
  * debian/libpoppler-qt4-4.symbols.in:
    - Updated
  * Updated for soname change libpoppler58 -> 61

 -- Robert Ancell <email address hidden>  Tue, 24 May 2016 11:12:14 +1200

Available diffs

Published in precise-updates on 2016-05-02
Published in precise-security on 2016-05-02
poppler (0.18.4-1ubuntu3.2) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service in pdfseparate via long filename
    - debian/patches/CVE-2013-4473.patch: improve path building in
      utils/pdfseparate.cc.
    - CVE-2013-4473
  * SECURITY UPDATE: denial of service in pdfseparate via string specifiers
    in filename
    - debian/patches/CVE-2013-4474.patch: properly filter filename in
      utils/pdfseparate.cc.
    - CVE-2013-4474
  * SECURITY UPDATE: heap overflow on invalid files
    - debian/patches/CVE-2015-8868.patch: check length of C0 array in
      poppler/Function.cc.
    - CVE-2015-8868

 -- Marc Deslauriers <email address hidden>  Fri, 29 Apr 2016 16:08:29 -0400
Published in wily-updates on 2016-05-02
Published in wily-security on 2016-05-02
poppler (0.33.0-0ubuntu3.1) wily-security; urgency=medium

  * SECURITY UPDATE: heap overflow on invalid files
    - debian/patches/CVE-2015-8868.patch: check length of C0 array in
      poppler/Function.cc.
    - CVE-2015-8868

 -- Marc Deslauriers <email address hidden>  Fri, 29 Apr 2016 15:56:35 -0400
Superseded in trusty-updates on 2017-07-07
Superseded in trusty-security on 2017-07-07
poppler (0.24.5-2ubuntu4.4) trusty-security; urgency=medium

  * SECURITY UPDATE: heap overflow on invalid files
    - debian/patches/CVE-2015-8868.patch: check length of C0 array in
      poppler/Function.cc.
    - CVE-2015-8868

 -- Marc Deslauriers <email address hidden>  Fri, 29 Apr 2016 15:58:02 -0400
Superseded in yakkety-release on 2016-06-10
Deleted in yakkety-proposed on 2016-06-11 (Reason: moved to release)
poppler (0.41.0-0ubuntu2) yakkety; urgency=medium

  * No-change rebuild for libpng soname change.

 -- Matthias Klose <email address hidden>  Sat, 23 Apr 2016 00:18:48 +0000

Available diffs

Superseded in yakkety-release on 2016-04-23
Published in xenial-release on 2016-03-14
Deleted in xenial-proposed (Reason: moved to release)
poppler (0.41.0-0ubuntu1) xenial; urgency=medium

  * New upstream version (soname update 57->58)
  * debian/patchres/revert_api_change.patch:
    - revert upstream commit that removed an enum, they claim it's
      not an abi change because it's unused, but other packages (bindings)
      rely on it to build still, we can drop the patch later once the
      redpends have been updated

 -- Sebastien Bacher <email address hidden>  Mon, 22 Feb 2016 18:45:00 +0100

Available diffs

Superseded in xenial-release on 2016-03-14
Deleted in xenial-proposed on 2016-03-15 (Reason: moved to release)
poppler (0.38.0-0ubuntu1) xenial; urgency=medium

  * New upstream release
  * debian/libpoppler-qt4-4.symbols.in:
    - Updated
  * Updated for soname change libpoppler56 -> 57

 -- Robert Ancell <email address hidden>  Mon, 23 Nov 2015 10:47:58 +1300
Superseded in xenial-release on 2015-12-10
Deleted in xenial-proposed on 2016-01-19 (Reason: moved to release)
poppler (0.37.0-0ubuntu1) xenial; urgency=medium

  * New upstream version
  * Updated for soname change libpoppler52 -> 56

 -- Sebastien Bacher <email address hidden>  Fri, 23 Oct 2015 17:38:30 +0200
Superseded in trusty-updates on 2016-05-02
Deleted in trusty-proposed on 2016-05-04 (Reason: moved to -updates)
poppler (0.24.5-2ubuntu4.3) trusty; urgency=medium

  * debian/patches/git_matrix_not_invertable.patch:
    - cairo: don't render text when text matrix is not invertable
      (lp: #1412916)

 -- Sebastien Bacher <email address hidden>  Tue, 13 Oct 2015 16:10:18 +0100
Superseded in xenial-release on 2015-11-13
Published in wily-release on 2015-08-11
Deleted in wily-proposed (Reason: moved to release)
poppler (0.33.0-0ubuntu3) wily; urgency=medium

  * Set hardening flags to "+all,-pie" to build with all hardening flags
    except -fPIE.

 -- Iain Lane <email address hidden>  Mon, 20 Jul 2015 12:53:12 +0100
Superseded in wily-release on 2015-08-11
Deleted in wily-proposed on 2015-08-13 (Reason: moved to release)
poppler (0.33.0-0ubuntu1) wily; urgency=medium

  * New upstream release (LP: #1449991)
  * Rename packages according to the new SONAMEs:
    - libpoppler49 -> libpoppler52
  * debian/libpoppler-glib8.symbols.in:
  * debian/libpoppler-qt4-4.symbols.in:
  * debian/libpoppler-qt5-1.symbols.in:
    - Updated

 -- Robert Ancell <email address hidden>  Tue, 23 Jun 2015 17:01:45 +1200
Superseded in wily-release on 2015-06-25
Published in vivid-release on 2015-01-22
Deleted in vivid-proposed (Reason: moved to release)
poppler (0.30.0-0ubuntu1) vivid; urgency=medium

  * New upstream release
  * Rename packages according to the new SONAMEs:
    - libpoppler47 -> libpoppler49
  * Explicitly pass --disable-libopenjpeg now - this support was auto-disabled
    before but now configure fails without this flag.
 -- Iain Lane <email address hidden>   Tue, 20 Jan 2015 12:06:08 +0000
Superseded in trusty-updates on 2015-11-18
Deleted in trusty-proposed on 2015-11-19 (Reason: moved to -updates)
poppler (0.24.5-2ubuntu4.2) trusty; urgency=medium

  * 0001-Map-Standard-Expert-encoding-ligatures-to-AGLFN-name.patch:
    Cherry-pick patch from upstream to fix ligature mapping with substitute
    fonts which don't use the current standard glyph names. (LP: #1379375)
 -- Iain Lane <email address hidden>   Mon, 19 Jan 2015 13:18:49 +0000
Obsolete in utopic-updates on 2016-11-03
Deleted in utopic-proposed on 2016-11-03 (Reason: moved to -updates)
poppler (0.26.5-0ubuntu2) utopic; urgency=medium

  * 0001-Map-Standard-Expert-encoding-ligatures-to-AGLFN-name.patch:
    Cherry-pick patch from upstream to fix ligature mapping with substitute
    fonts which don't use the current standard glyph names. (LP: #1379375)
 -- Iain Lane <email address hidden>   Mon, 19 Jan 2015 12:52:43 +0000
Superseded in vivid-release on 2015-01-22
Deleted in vivid-proposed on 2015-01-25 (Reason: moved to release)
poppler (0.28.1-1ubuntu1) vivid; urgency=medium

  * Resynchronise with Debian, remaining changes:
    - Drop libopenjpeg-dev build depends, it is in universe.
    - Lower poppler-data to Suggests, it is too big for CD images,
      handled by language-selector.

Superseded in trusty-updates on 2015-01-28
Deleted in trusty-proposed on 2015-01-29 (Reason: moved to -updates)
poppler (0.24.5-2ubuntu4.1) trusty; urgency=medium

  * debian/patches/git_hint_table.patch:
    - backport git patch to fix pdf parsing issues (lp: #1377695)
 -- Sebastien Bacher <email address hidden>   Fri, 17 Oct 2014 19:22:35 +0200
Superseded in vivid-release on 2014-11-14
Obsolete in utopic-release on 2016-11-03
Deleted in utopic-proposed on 2016-11-03 (Reason: moved to release)
poppler (0.26.5-0ubuntu1) utopic; urgency=medium

  * New upstream bugfix version
 -- Sebastien Bacher <email address hidden>   Mon, 29 Sep 2014 19:01:18 +0200
Superseded in utopic-release on 2014-09-30
Deleted in utopic-proposed on 2014-10-01 (Reason: moved to release)
poppler (0.26.4-0ubuntu1) utopic; urgency=medium

  * New upstream version
  * debian/control: updated qt4 requirement to 4.7
 -- Sebastien Bacher <email address hidden>   Mon, 22 Sep 2014 15:36:16 +0200
Superseded in utopic-release on 2014-09-22
Deleted in utopic-proposed on 2014-09-23 (Reason: moved to release)
poppler (0.26.2-2ubuntu1) utopic; urgency=medium

  * Merge with Debian experimental, remaining changes:
    - Drop libopenjpeg-dev build depends, it is in universe.
    - Lower poppler-data to Suggests, it is too big for CD images,
      handled by language-selector.
    - Add simple compile/link/run autopkgtest.
    - Build with dh-autoreconf.
 -- Robert Ancell <email address hidden>   Mon, 07 Jul 2014 12:11:41 +1200
Superseded in utopic-release on 2014-07-07
Deleted in utopic-proposed on 2014-07-08 (Reason: moved to release)
poppler (0.26.1-1ubuntu1) utopic; urgency=medium

  * Merge with Debian experimental, remaining changes:
    - Drop libopenjpeg-dev build depends, it is in universe.
    - Lower poppler-data to Suggests, it is too big for CD images,
      handled by language-selector.
    - Add simple compile/link/run autopkgtest.
    - Build with dh-autoreconf.

Superseded in utopic-release on 2014-06-09
Deleted in utopic-proposed on 2014-06-10 (Reason: moved to release)
poppler (0.26.0-1ubuntu2) utopic; urgency=medium

  * Don't have libpoppler-dev depend on libpoppler-private-dev. If a package
    needs this to build then it should Build-Depend on libpoppler-private-dev
    directly. (LP: #1325174)
 -- Iain Lane <email address hidden>   Thu, 05 Jun 2014 11:01:06 +0100

Available diffs

Superseded in utopic-release on 2014-06-05
Deleted in utopic-proposed on 2014-06-06 (Reason: moved to release)
poppler (0.26.0-1ubuntu1) utopic; urgency=medium

  * Merge with Debian experimental, remaining changes:
    - Drop libopenjpeg-dev build depends, it is in universe.
    - Lower poppler-data to Suggests, it is too big for CD images,
      handled by language-selector.
    - Have libpoppler-dev Depend on libpoppler-private-dev, to help with
      the transition after the split of the two packages.
    - Add simple compile/link/run autopkgtest.
    - Build with dh-autoreconf.

Available diffs

Superseded in utopic-release on 2014-05-28
Deleted in utopic-proposed on 2014-05-30 (Reason: moved to release)
poppler (0.24.5-2ubuntu5) utopic; urgency=medium

  * No-change rebuild for shlib changes in qtbase and qtdeclarative.
 -- Ricardo Salveti de Araujo <email address hidden>   Tue, 29 Apr 2014 00:28:46 -0700
Superseded in utopic-release on 2014-04-29
Published in trusty-release on 2014-03-14
Deleted in trusty-proposed (Reason: moved to release)
poppler (0.24.5-2ubuntu4) trusty; urgency=medium

  * Rebuild to solve a powerpc dependency problem.
 -- Timo Jyrinki <email address hidden>   Fri, 07 Mar 2014 11:46:30 +0200
Superseded in trusty-release on 2014-03-14
Deleted in trusty-proposed on 2014-03-15 (Reason: moved to release)
poppler (0.24.5-2ubuntu2) trusty; urgency=medium

  * Revert the -O0 change. Apparently a texlive issue. LP: #1273779.
 -- Matthias Klose <email address hidden>   Mon, 24 Feb 2014 17:52:15 +0100

Available diffs

Superseded in trusty-release on 2014-02-24
Deleted in trusty-proposed on 2014-02-25 (Reason: moved to release)
poppler (0.24.5-2ubuntu1) trusty; urgency=medium

  * Merge with Debian experimental (LP: #1276443), remaining changes:
    - Drop libopenjpeg-dev build depends, it is in universe.
    - Lower poppler-data to Suggests, it is too big for CD images,
      handled by language-selector.
    - Have libpoppler-dev Depend on libpoppler-private-dev, to help with
      the transition after the split of the two packages.
    - Add libpoppler-glib-doc Breaks/Replaces on libpoppler-glib-dev
      (<= 0.24.4).
    - Add simple compile/link/run autopkgtest.
    - Backport duplex printing fixes (pdftops-origpagesizes-fixes.diff,
      pdftops-origpagesizes-papersize-setpagedevice-fix.diff).
    - Build with dh-autoreconf.
    - Build with -O0 until LP #1273779 is addressed.

Superseded in trusty-release on 2014-02-05
Deleted in trusty-proposed on 2014-02-06 (Reason: moved to release)
poppler (0.24.5-0ubuntu3) trusty; urgency=medium

  * Just append -O0 to CFLAGS/CXXFLAGS to keep the hardening flags enabled.
 -- Matthias Klose <email address hidden>   Wed, 29 Jan 2014 10:27:27 +0000
Superseded in trusty-proposed on 2014-01-29
poppler (0.24.5-0ubuntu2) trusty; urgency=medium

  * Build with -O0 until #1273779 is addressed.
 -- Matthias Klose <email address hidden>   Wed, 29 Jan 2014 10:29:40 +0100

Available diffs

Superseded in trusty-proposed on 2014-01-29
poppler (0.24.5-0ubuntu1) trusty; urgency=low

  * New upstream version
  * Reapplied the Ubuntu changes that were added since the merge work
    done by Dmitry
  * debian/patches/pdftops-origpagesizes-fixes.diff,
    debian/patches/pdftops-origpagesizes-papersize-setpagedevice-fix.diff:
    - duplex printing fixes
  * debian/control.in, debian/rules:
    - build using dh-autoreconf

  [ Dmitry Shachnev ]
  * Merge with Debian experimental (LP: #1256627), remaining changes:
    - Drop libopenjpeg-dev build depends, it's in universe.
    - Lower poppler-data to Suggests, it is too big for CD images,
      handled by language-selector.
    - Have libpoppler-dev Depend on libpoppler-private-dev, to help with
      the transition after the split of the two packages.
    - Build Qt 5 packages.
    - Add simple compile/link/run autopkgtest.
    - Differences in symbols file.
  * New upstream bugfix release.
  * Update soname version to 44.
  * Add libpoppler-glib-doc Breaks/Replaces on libpoppler-glib-dev
    (<= 0.24.4).
  * Update debian/copyright (taken from unreleased Debian Git).

  [ Timo Jyrinki ]
  * Backport upstream patch to support two variations of moc binary version
    output to fix Qt 5.2 (LP: #1271026)
 -- Sebastien Bacher <email address hidden>   Wed, 22 Jan 2014 18:43:28 +0100
Superseded in trusty-release on 2014-02-04
Deleted in trusty-proposed on 2014-02-06 (Reason: moved to release)
poppler (0.24.3-0ubuntu12) trusty; urgency=medium

  * debian/patches/pdftops-origpagesizes-papersize-setpagedevice-fix.diff:
    Re-introduced patch to fix duplex printing (from -0ubuntu5).
 -- Till Kamppeter <email address hidden>   Thu,  2 Jan 2014 21:57:33 +0100
Superseded in trusty-proposed on 2014-01-02
poppler (0.24.3-0ubuntu11) trusty; urgency=medium

  * debian/patches/pdftops-origpagesizes-fixes.diff: Backed out all upstream
    backports after -0ubuntu4 as they introduce an ABI change.
 -- Till Kamppeter <email address hidden>   Thu,  2 Jan 2014 21:23:33 +0100
Superseded in trusty-release on 2014-01-02
Deleted in trusty-proposed on 2014-01-04 (Reason: moved to release)
poppler (0.24.3-0ubuntu10) trusty; urgency=medium

  * debian/patches/pdftops-origpagesizes-fixes.diff: Another upstream update
    for the patch, this time applying the fixes also to pdftocairo. See
    comments #49 and #50 in Freedesktop/Poppler bug #72312.
 -- Till Kamppeter <email address hidden>   Mon, 30 Dec 2013 11:57:33 +0100
Superseded in trusty-proposed on 2013-12-30
poppler (0.24.3-0ubuntu9) trusty; urgency=medium

  * debian/patches/pdftops-origpagesizes-fixes.diff: Another upstream update
    for the patch, this time correcting a segfault on a broken PDF file. See
    comments #47 and #48 in Freedesktop/Poppler bug #72312.
 -- Till Kamppeter <email address hidden>   Sun, 29 Dec 2013 23:06:33 +0100
Superseded in trusty-release on 2013-12-31
Deleted in trusty-proposed on 2014-01-01 (Reason: moved to release)
poppler (0.24.3-0ubuntu8) trusty; urgency=medium

  * debian/patches/pdftops-origpagesizes-fixes.diff: Another upstream update
    for the patch, this time correcting rounding errors. See see comments #39
    and #40 in Freedesktop/Poppler bug #72312.
 -- Till Kamppeter <email address hidden>   Sat, 21 Dec 2013 22:47:33 +0100
Superseded in trusty-release on 2013-12-21
Deleted in trusty-proposed on 2013-12-23 (Reason: moved to release)
poppler (0.24.3-0ubuntu7) trusty; urgency=medium

  * debian/patches/pdftops-origpagesizes-fixes.diff: The changes for pdftops
    broke conversion of PostScript to PNG with ImageMagick, see comments #33 -
    #37 in Freedesktop/Poppler bug #72312. This update solves the problem.
 -- Till Kamppeter <email address hidden>   Sat, 21 Dec 2013 11:31:33 +0100
Superseded in trusty-release on 2013-12-21
Deleted in trusty-proposed on 2013-12-22 (Reason: moved to release)
poppler (0.24.3-0ubuntu6) trusty; urgency=medium

  * debian/patches/pdftops-origpagesizes-fixes.diff: Updated patch to upstream
    patches from Freedesktop/Poppler bug #72312.
  * debian/patches/pdftops-paper-segfault-fix.diff,
    debian/patches/pdftops-origpagesizes-papersize-setpagedevice-fix.diff:
    Removed, these changes are in pdftops-origpagesizes-fixes.diff now.
 -- Till Kamppeter <email address hidden>   Fri, 20 Dec 2013 00:22:33 +0100
Superseded in trusty-release on 2013-12-20
Deleted in trusty-proposed on 2013-12-21 (Reason: moved to release)
poppler (0.24.3-0ubuntu5) trusty; urgency=medium

  * debian/patches/pdftops-origpagesizes-papersize-setpagedevice-fix.diff:
    Fixed handling of paper sizes in the output of pdftops so that duplex
    printing works.
  * debian/patches/pdftops-paper-segfault-fix.diff: Fixed segfault in upstream
    patches of Freedesktop/Poppler bug #72312 when calling "pdftops -paper ...".
  * debian/patches/pdftops-origpagesizes-fixes.diff: Updated patch to upstream
    patches from Freedesktop/Poppler bug #72312.
 -- Till Kamppeter <email address hidden>   Mon, 16 Dec 2013 16:58:33 +0100
Superseded in trusty-release on 2013-12-16
Deleted in trusty-proposed on 2013-12-18 (Reason: moved to release)
poppler (0.24.3-0ubuntu4) trusty; urgency=medium

  * Use dh-autoreconf.
 -- Steve Langasek <email address hidden>   Fri, 13 Dec 2013 11:44:17 -0800

Available diffs

Superseded in trusty-release on 2013-12-13
Deleted in trusty-proposed on 2013-12-15 (Reason: moved to release)
poppler (0.24.3-0ubuntu3) trusty; urgency=low

  * debian/patches/pdftops-origpagesizes-fixes.diff: Turn off centering
    of the page content when doing "pdftops -origpagesizes". This does not
    make sense in this mode and breaks some files.
 -- Till Kamppeter <email address hidden>   Tue,  3 Dec 2013 23:44:33 +0100

Available diffs

Superseded in trusty-release on 2013-12-03
Deleted in trusty-proposed on 2013-12-05 (Reason: moved to release)
poppler (0.24.3-0ubuntu2) trusty; urgency=low

  * debian/patches/pdftops-origpagesizes-fixes.diff: Output of "pdftops
    -origpagesizes" was broken, especially PDFs which have a rotation set
    (for example from the pdftopdf from cups-filters) are turned into
    PostScript files without this rotation. This leads to problems with
    Landscape-oriented printouts, especially on mobile devices where only
    Poppler is available and no Ghostscript for doing PDF->PS conversion
    (Red Hat bug #768811, LP: #1243484, LP: #1247740).
 -- Till Kamppeter <email address hidden>   Tue,  3 Dec 2013 18:01:33 +0100
Superseded in trusty-release on 2013-12-03
Deleted in trusty-proposed on 2013-12-05 (Reason: moved to release)
poppler (0.24.3-0ubuntu1) trusty; urgency=low

  * New upstream version
 -- Sebastien Bacher <email address hidden>   Tue, 05 Nov 2013 12:41:48 +0100
Superseded in trusty-release on 2013-11-05
Obsolete in saucy-release on 2015-04-24
Deleted in saucy-proposed on 2015-04-28 (Reason: moved to release)
poppler (0.24.1-0ubuntu1) saucy; urgency=low

  * New upstream version
 -- Sebastien Bacher <email address hidden>   Tue, 27 Aug 2013 16:35:09 +0200
Superseded in saucy-release on 2013-08-27
Deleted in saucy-proposed on 2013-08-29 (Reason: moved to release)
poppler (0.24.0-0ubuntu1) saucy; urgency=low

  * New upstream version, new soname version (37 -> 43)
  * debian/debian/libpoppler-qt4-4.symbols.in:
    - updated for the new version
  * Build qt5 packages
 -- Sebastien Bacher <email address hidden>   Tue, 30 Jul 2013 14:23:19 +0200

Available diffs

Superseded in saucy-release on 2013-08-05
Deleted in saucy-proposed on 2013-08-07 (Reason: moved to release)
poppler (0.22.4-0ubuntu1) saucy; urgency=low

  * New upstream release 0.22.4 (LP: #1135995).
    - Should fix the text selection problems (LP: #39890).
    - Should fix issues with PDF forms (LP: #1153517).
  * Drop all upstream patches and refresh other patches.
  * Change the soname version in package name: libpoppler28 -> libpoppler37.
  * Update symbols files.
  * Update debian/copyright (taken from Debian packaging Git).
 -- Dmitry Shachnev <email address hidden>   Fri, 17 May 2013 17:07:14 +0400

Available diffs

Obsolete in hardy-updates on 2015-04-24
Obsolete in hardy-security on 2015-04-24
poppler (0.6.4-1ubuntu3.6) hardy-security; urgency=low

  * SECURITY UPDATE: invalid memory access issues
    - debian/patches/110_security_CVE-2013-1788.patch: add checks in
      poppler/Function.cc, poppler/Stream.cc, splash/Splash.cc.
    - CVE-2013-1788
  * SECURITY UPDATE: uninitialized memory read
    - debian/patches/111_security_CVE-2013-1790.patch: properly handle
      refLine in poppler/Stream.cc.
    - CVE-2013-1790
 -- Marc Deslauriers <email address hidden>   Wed, 27 Mar 2013 14:17:55 -0400
Obsolete in oneiric-updates on 2015-04-24
Obsolete in oneiric-security on 2015-04-24
poppler (0.16.7-2ubuntu2.1) oneiric-security; urgency=low

  * SECURITY UPDATE: invalid memory access issues
    - debian/patches/CVE-2013-1788.patch: add checks in poppler/Function.cc,
      poppler/Stream.cc, splash/Splash.cc.
    - CVE-2013-1788
  * SECURITY UPDATE: uninitialized memory read
    - debian/patches/CVE-2013-1790.patch: properly handle refLine in
      poppler/Stream.cc.
    - CVE-2013-1790
 -- Marc Deslauriers <email address hidden>   Wed, 27 Mar 2013 09:33:46 -0400
Superseded in precise-updates on 2016-05-02
Superseded in precise-security on 2016-05-02
poppler (0.18.4-1ubuntu3.1) precise-security; urgency=low

  * SECURITY UPDATE: invalid memory access issues
    - debian/patches/CVE-2013-1788.patch: add checks in poppler/Function.cc,
      poppler/Stream.cc, splash/Splash.cc.
    - CVE-2013-1788
  * SECURITY UPDATE: uninitialized memory read
    - debian/patches/CVE-2013-1790.patch: properly handle refLine in
      poppler/Stream.cc.
    - CVE-2013-1790
 -- Marc Deslauriers <email address hidden>   Wed, 27 Mar 2013 09:32:19 -0400
175 of 254 results