Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:Update
patchinfo.5691
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.5691
<patchinfo incident="5691"> <issue id="1045939" tracker="bnc">VUL-1: CVE-2017-9865: poppler: DoS in function GfxImageColorMap::getGray in GfxState.cc</issue> <issue id="1059066" tracker="bnc">VUL-0: CVE-2017-14517: poppler: NULL Pointer Dereference exists in the XRef::parseEntry() function in XRef.cc</issue> <issue id="1059101" tracker="bnc">VUL-0: CVE-2017-14518: poppler: floating point exception exists in the isImageInterpolationRequired() function in Splash.cc</issue> <issue id="1059155" tracker="bnc">VUL-0: CVE-2017-14520: poppler: floating point exception occurs in Splash::scaleImageYuXd() in Splash.cc</issue> <issue id="1060220" tracker="bnc">VUL-0: CVE-2017-14617: poppler: Ifloating point exception occurs in the ImageStream class inStream.cc, which may lead to denial of service</issue> <issue id="1061092" tracker="bnc">VUL-0: CVE-2017-14928: poppler: In Poppler 0.59.0, a NULL Pointer Dereference exists inAnnotRichMedia::Configuration::Configuration in Annot.cc via a craftedPDF document.</issue> <issue id="1061263" tracker="bnc">VUL-0: CVE-2017-14975: poppler: denial of service in FoFiType1C::convertToType0 function in FoFiType1C.cc</issue> <issue id="1061264" tracker="bnc">VUL-0: CVE-2017-14976: poppler: The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has aheap-based buffer over-read vulnerability if an out-of-bounds font dictionaryindex is encountered, which allows an attacker to</issue> <issue id="1061265" tracker="bnc">VUL-0: CVE-2017-14977: poppler: denial of service in FoFiTrueType::getCFFBlock function in FoFiTrueType.cc</issue> <issue id="1064593" tracker="bnc">VUL-0: CVE-2017-15565: poppler: NULL Pointer Dereference exists in theGfxImageColorMap::getGrayLine() and could lead to denial of service</issue> <issue id="1074453" tracker="bnc">VUL-0: CVE-2017-1000456: poppler: libpoppler fails to validate boundaries inTextPool::addWord, leading to overflow in subsequent calculations.</issue> <issue id="2017-1000456" tracker="cve" /> <issue id="2017-15565" tracker="cve" /> <issue id="2017-14517" tracker="cve" /> <issue id="2017-14518" tracker="cve" /> <issue id="2017-14520" tracker="cve" /> <issue id="2017-9865" tracker="cve" /> <issue id="2017-14617" tracker="cve" /> <issue id="2017-14928" tracker="cve" /> <issue id="2017-14975" tracker="cve" /> <issue id="2017-14976" tracker="cve" /> <issue id="2017-14977" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>psimons</packager> <description>This update for poppler fixes the following issues: These security issues were fixed: - CVE-2017-14517: Prevent NULL Pointer dereference in the XRef::parseEntry() function via a crafted PDF document (bsc#1059066). - CVE-2017-9865: Fixed a stack-based buffer overflow vulnerability in GfxState.cc that would have allowed attackers to facilitate a denial-of-service attack via specially crafted PDF documents. (bsc#1045939) - CVE-2017-14518: Remedy a floating point exception in isImageInterpolationRequired() that could have been exploited using a specially crafted PDF document. (bsc#1059101) - CVE-2017-14520: Remedy a floating point exception in Splash::scaleImageYuXd() that could have been exploited using a specially crafted PDF document. (bsc#1059155) - CVE-2017-14617: Fixed a floating point exception in Stream.cc, which may lead to a potential attack when handling malicious PDF files. (bsc#1060220) - CVE-2017-14928: Fixed a NULL Pointer dereference in AnnotRichMedia::Configuration::Configuration() in Annot.cc, which may lead to a potential attack when handling malicious PDF files. (bsc#1061092) - CVE-2017-14975: Fixed a NULL pointer dereference vulnerability, that existed because a data structure in FoFiType1C.cc was not initialized, which allowed an attacker to launch a denial of service attack. (bsc#1061263) - CVE-2017-14976: Fixed a heap-based buffer over-read vulnerability in FoFiType1C.cc that occurred when an out-of-bounds font dictionary index was encountered, which allowed an attacker to launch a denial of service attack. (bsc#1061264) - CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred due to lack of validation of a table pointer, which allows an attacker to launch a denial of service attack. (bsc#1061265) - CVE-2017-15565: Prevent NULL Pointer dereference in the GfxImageColorMap::getGrayLine() function via a crafted PDF document (bsc#1064593). - CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent overflows in subsequent calculations (bsc#1074453). </description> <summary>Security update for poppler</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor