Updated poppler packages fix security vulnerabilities
Publication date: 05 Oct 2017Modification date: 05 Oct 2017
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-14517 , CVE-2017-14519 , CVE-2017-14520
Description
In Poppler 0.59.0, a NULL Pointer Dereference exists in the XRef::parseEntry() function in XRef.cc via a crafted PDF document. (CVE-2017-14517) In Poppler 0.59.0, memory corruption occurs in a call to Object::streamGetChar in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and Gfx::doShowText calls (aka a Gfx.cc infinite loop). (CVE-2017-14519) In Poppler 0.59.0, a floating point exception occurs in Splash::scaleImageYuXd() in Splash.cc, which may lead to a potential attack when handling malicious PDF files. (CVE-2017-14520)
References
- https://bugs.mageia.org/show_bug.cgi?id=21784
- https://usn.ubuntu.com/usn/usn-3433-1/
- https://bugzilla.redhat.com/show_bug.cgi?id=1494582
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520
SRPMS
6/core
- poppler-0.52.0-3.2.mga6
5/core
- poppler-0.26.5-2.4.mga5