Unspecified vulnerability in certain versions of xpdf after 3.00, as used in various products including (a) pdfkit.framework, (b) gpdf, (c) pdftohtml, has unknown impact and user-complicit attack vectors, possibly involving errors in (1) gmem.c, (2) SplashXPathScanner.cc, (3) JBIG2Stream.cc, (4) JPXStream.cc, and/or (5) Stream.cc. NOTE: this description is based on Debian advisory DSA 979, which is based on changes that were made after other vulnerabilities such as CVE-2006-0301 and CVE-2005-3624 through CVE-2005-3628 were fixed. Some of these newer fixes appear to be security-relevant, although it is not clear if they fix specific issues or are defensive in nature.
Created attachment 5295 [details] [review] Patch to fix CVE-2006-1244 (as provided by Derek Noonburg)
xpdf/JBIG2Stream.cc, xpdf/Stream.h, splash/SplashXPathScanner.cc: Fix various integer overflows.
Am I correct assuming this is already fixed in 0.5.1 ?
I think so, it's also fixed in Debian version as part of xpdf 3.01 fixes, but still it affects stable version and it's possible security issue.
(In reply to comment #4) > I think so, it's also fixed in Debian version as part of xpdf 3.01 fixes, but > still it affects stable version and it's possible security issue. Thanks for information.
Reassinging bug to the release dude.
Fixed time ago
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.