Commit 88fcabc3 authored by Markus Koschany's avatar Markus Koschany

DLA-1706-1 advisory

parent 5590ac70
<define-tag pagetitle>DLA-1706-1 poppler</define-tag>
<define-tag report_date>2019-3-8</define-tag>
<define-tag secrefs>CVE-2018-19058 CVE-2018-20481 CVE-2018-20662 CVE-2019-7310 CVE-2019-9200 Bug#913177 Bug#917325 Bug#918158 Bug#921215 Bug#923414</define-tag>
<define-tag packages>poppler</define-tag>
<define-tag isvulnerable>yes</define-tag>
<define-tag fixed>yes</define-tag>
<define-tag fixed-section>no</define-tag>
#use wml::debian::security
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>Several security vulnerabilities were discovered in the poppler PDF
rendering shared library.</p>
<li><a href="">CVE-2018-19058</a>
<p>A reachable abort in Object.h will lead to denial-of-service because
EmbFile::save2 in lacks a stream check before saving an
embedded file.</p></li>
<li><a href="">CVE-2018-20481</a>
<p>Poppler mishandles unallocated XRef entries, which allows remote
attackers to cause a denial-of-service (NULL pointer dereference)
via a crafted PDF document.</p></li>
<li><a href="">CVE-2018-20662</a>
<p>Poppler allows attackers to cause a denial-of-service (application
crash and segmentation fault by crafting a PDF file in which an xref
data structure is corrupted.</p></li>
<li><a href="">CVE-2019-7310</a>
<p>A heap-based buffer over-read (due to an integer signedness error in
the XRef::getEntry function in allows remote attackers to
cause a denial of service (application crash) or possibly have
unspecified other impact via a crafted PDF document.</p></li>
<li><a href="">CVE-2019-9200</a>
<p>A heap-based buffer underwrite exists in ImageStream::getLine()
located at that can (for example) be triggered by sending
a crafted PDF file to the pdfimages binary. It allows an attacker to
cause denial-of-service (segmentation fault) or possibly have
unspecified other impact.</p>
<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
<p>We recommend that you upgrade your poppler packages.</p>
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a rel="nofollow" href=""></a></p></li>
# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2019/"
# $Id: $
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment