CVE-2013-7437

Priority
Description
Multiple integer overflows in potrace 1.11 allow remote attackers to cause
a denial of service (crash) via large dimensions in a BMP image, which
triggers a buffer overflow.
Notes
 tyhicks> inkscape in xenial and earlier embeds libpotrace (LP: #1156664)
 tyhicks> I don't see a public development tree for potrace but comment #42 of
  the Debian bug contains a broken out patch from the upstream potrace
  maintainer
 mdeslaur> potrace in inkscape works on bitmaps already loaded, not
 mdeslaur> arbitrary images. Marking as not-affected for inkscape.
Package
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (no attack vector)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (no attack vector)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (uses system potrace)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (uses system potrace)
Ubuntu 19.04 (Disco Dingo):not-affected (uses system potrace)
Package
Upstream:released (1.12)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [1.10-1+deb7u1build0.12.04.1])
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (1.12-1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.12-1)
Ubuntu 18.10 (Cosmic Cuttlefish):released (1.12-1)
Ubuntu 19.04 (Disco Dingo):released (1.12-1)
Patches:
Upstream:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778646#42 (from upstream maintainer)
More Information

Updated: 2019-01-14 21:15:05 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)