Updated poppler packages fix security vulnerabilities
Publication date: 05 Oct 2017Modification date: 05 Oct 2017
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-14517 , CVE-2017-14519 , CVE-2017-14520
Description
In Poppler 0.59.0, a NULL Pointer Dereference exists in the
XRef::parseEntry() function in XRef.cc via a crafted PDF document.
(CVE-2017-14517)
In Poppler 0.59.0, memory corruption occurs in a call to
Object::streamGetChar in Object.h after a repeating series of
Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and
Gfx::doShowText calls (aka a Gfx.cc infinite loop). (CVE-2017-14519)
In Poppler 0.59.0, a floating point exception occurs in
Splash::scaleImageYuXd() in Splash.cc, which may lead to a potential
attack when handling malicious PDF files. (CVE-2017-14520)
References
- https://bugs.mageia.org/show_bug.cgi?id=21784
- https://usn.ubuntu.com/usn/usn-3433-1/
- https://bugzilla.redhat.com/show_bug.cgi?id=1494582
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520
SRPMS
5/core
- poppler-0.26.5-2.4.mga5
6/core
- poppler-0.52.0-3.2.mga6