CVE-2013-7437
Publication date 29 March 2015
Last updated 24 July 2024
Ubuntu priority
Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.
Status
Package | Ubuntu Release | Status |
---|---|---|
inkscape | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
potrace | ||
18.04 LTS bionic |
Fixed 1.12-1
|
|
16.04 LTS xenial |
Fixed 1.12-1
|
|
14.04 LTS trusty | Not in release | |
Notes
tyhicks
inkscape in xenial and earlier embeds libpotrace (LP: #1156664) I don't see a public development tree for potrace but comment #42 of the Debian bug contains a broken out patch from the upstream potrace maintainer
mdeslaur
potrace in inkscape works on bitmaps already loaded, not arbitrary images. Marking as not-affected for inkscape.
Patch details
Package | Patch details |
---|---|
potrace |