<html>
<head>
<base href="https://bugs.freedesktop.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_RESOLVED bz_closed"
title="RESOLVED WORKSFORME - Evince crashed with SIGABRT in __kernel_vsyscall()"
href="https://bugs.freedesktop.org/show_bug.cgi?id=88990#c11">Comment # 11</a>
on <a class="bz_bug_link
bz_status_RESOLVED bz_closed"
title="RESOLVED WORKSFORME - Evince crashed with SIGABRT in __kernel_vsyscall()"
href="https://bugs.freedesktop.org/show_bug.cgi?id=88990">bug 88990</a>
from <span class="vcard"><a class="email" href="mailto:jason@aquaticape.us" title="Jason Crain <jason@aquaticape.us>"> <span class="fn">Jason Crain</span></a>
</span></b>
<pre>(In reply to veysel from <a href="show_bug.cgi?id=88990#c9">comment #9</a>)
<span class="quote">> Could you tell me what should I do to be not affected by this vulnerability
> as a user of Ubuntu? Or what else should I do as a bug reporter?</span >
It's not a vulnerability. It's just a call to abort() because the annotation
matrix is bad.
This was fixed in <a class="bz_bug_link
bz_status_RESOLVED bz_closed"
title="RESOLVED FIXED - [pdftotext] aborts with Internal Error+SIGABRT"
href="show_bug.cgi?id=84990">bug 84990</a>. If you really want to, you can try compiling from
source, or see if you can find an Ubuntu package for poppler 0.30.0 or later,
or ask Ubuntu to provide a package through their stable release updates process
or backports process.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>