Mageia 2019-0276: poppler security update
Summary
The updated packages fix security vulnerabilities:
The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check
for negative values of stream length, leading to an Integer Overflow,
thereby making it possible to allocate a large memory chunk on the heap,
with a size controlled by an attacker, as demonstrated by pdftocairo.
(CVE-2019-9959)
An issue was discovered in Poppler 0.74.0. There is a heap-based buffer
over-read in the function PSOutputDev::checkPageSlice at PSOutputDev.cc.
(CVE-2019-10871)
References
- https://bugs.mageia.org/show_bug.cgi?id=25432
- https://access.redhat.com/errata/RHSA-2019:2713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871
Resolution
MGASA-2019-0276 - Updated poppler packages fix security vulnerabilities
SRPMS
- 7/core/poppler-0.74.0-3.2.mga7
- 6/core/poppler-0.52.0-3.14.mga6