CVE-2013-7437
Publication date 29 March 2015
Last updated 24 July 2024
Ubuntu priority
Description
Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| inkscape | ||
| 18.04 LTS bionic |
Not affected
|
|
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty | Not in release | |
| potrace | ||
| 18.04 LTS bionic |
Fixed 1.12-1
|
|
| 16.04 LTS xenial |
Fixed 1.12-1
|
|
| 14.04 LTS trusty | Not in release | |
Notes
tyhicks
inkscape in xenial and earlier embeds libpotrace (LP: #1156664) I don't see a public development tree for potrace but comment #42 of the Debian bug contains a broken out patch from the upstream potrace maintainer
mdeslaur
potrace in inkscape works on bitmaps already loaded, not arbitrary images. Marking as not-affected for inkscape.
Patch details
| Package | Patch details |
|---|---|
| potrace |