Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:Update
patchinfo.31256
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.31256
<patchinfo incident="31256"> <issue tracker="cve" id="2022-37052"/> <issue tracker="cve" id="2019-9545"/> <issue tracker="cve" id="2019-9631"/> <issue tracker="cve" id="2019-13287"/> <issue tracker="cve" id="2018-18456"/> <issue tracker="cve" id="2020-36023"/> <issue tracker="cve" id="2018-18454"/> <issue tracker="cve" id="2019-14292"/> <issue tracker="cve" id="2022-48545"/> <issue tracker="bnc" id="1214726">VUL-0: CVE-2022-37052: poppler: reachable assertion due to a failure in markObject()</issue> <issue tracker="bnc" id="1128114">VUL-1: CVE-2019-9545: poppler: denial of service via recursive function call, in JBIG2Stream:readTextRegion() located in JBIG2Stream.cc</issue> <issue tracker="bnc" id="1129202">VUL-1: CVE-2019-9631: poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc</issue> <issue tracker="bnc" id="1214256">VUL-0: CVE-2020-36023: poppler: Stack-Overflow in `FoFiType1C:cvtGlyph`</issue> <issue tracker="bnc" id="1140745">VUL-1: CVE-2019-13287: xpdf,poppler: In Xpdf 4.01.01, there is an out-of-bounds read vulnerability in the function SplashXPath:strokeAdjust() located at splash/SplashXPath.cc. It can, for example, be triggered by sending a crafted PDF docum</issue> <issue tracker="bnc" id="1112428">VUL-1: CVE-2018-18456: xpdf: Object:isName() in Object.h called from Gfx:opSetFillColorN stack-based buffer over-read</issue> <issue tracker="bnc" id="1112424">VUL-1: CVE-2018-18454: xpdf: CCITTFaxStream:readRow() in Stream.cc heap-based buffer over-read</issue> <issue tracker="bnc" id="1214723">VUL-0: CVE-2022-48545: poppler: infinite recursion in Catalog:findDestInTree</issue> <issue tracker="bnc" id="1143570">VUL-1: CVE-2019-14292: xpdf, poppler: An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading:parse at GfxState.cc for typeA!=6 case 1.</issue> <packager>pgajdos</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for poppler</summary> <description>This update for poppler fixes the following issues: - CVE-2019-9545: Fixed a potential crash due to uncontrolled recursion in the JBIG parser (bsc#1128114). - CVE-2019-9631: Fixed an out of bounds read when converting a PDF to an image (bsc#1129202). - CVE-2022-37052: Fixed a reachable assertion when extracting pages of a PDf file (bsc#1214726). - CVE-2020-36023: Fixed a stack bugger overflow in FoFiType1C:cvtGlyph (bsc#1214256). - CVE-2019-13287: Fixed an out-of-bounds read vulnerability in the function SplashXPath:strokeAdjust (bsc#1140745). - CVE-2018-18456: Fixed a stack-based buffer over-read via a crafted pdf file (bsc#1112428). - CVE-2018-18454: Fixed heap-based buffer over-read via a crafted pdf file (bsc#1112424). - CVE-2019-14292: Fixed an out of bounds read in GfxState.cc (bsc#1143570). - CVE-2022-48545: Fixed an infinite recursion in Catalog::findDestInTree which can cause denial of service (bsc#1214723). </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor