CVE-2011-0764

NameCVE-2011-0764
Descriptiont1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2388-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
poppler (PTS)buster0.71.0-5fixed
buster (security)0.71.0-5+deb10u3fixed
bullseye (security), bullseye20.09.0-3.1+deb11u1fixed
bookworm22.12.0-2fixed
trixie24.02.0-4fixed
sid24.02.0-5fixed
xpdf (PTS)buster3.04-13fixed
bullseye3.04+git20210103-3fixed
bookworm3.04+git20220601-1fixed
sid, trixie3.04+git20240202-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
popplersource(unstable)(not affected)
t1libsourcelenny5.1.2-3+lenny1
t1libsourcesqueeze5.1.2-3+squeeze1
t1libsource(unstable)5.1.2-3.3
xpdfsource(unstable)3.02-9

Notes

- poppler <not-affected> (never used t1lib)
http://www.toucan-system.com/advisories/tssa-2011-01.txt

Search for package or bug name: Reporting problems