RedHat: RHSA-2019-2713:01 Moderate: poppler security update
Summary
Poppler is a Portable Document Format (PDF) rendering library, used by
applications such as Evince.
Security Fix(es):
* poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc
(CVE-2019-7310)
* poppler: heap-based buffer overflow in function ImageStream::getLine() in
Stream.cc (CVE-2019-9200)
* poppler: heap-based buffer over-read in function
PSOutputDev::checkPageSlice in PSOutputDev.cc (CVE-2019-10871)
* poppler: heap-based buffer over-read in JPXStream::init in
JPEG2000Stream.cc (CVE-2019-12293)
* poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc
(CVE-2018-18897)
* poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc
(CVE-2018-20481)
* poppler: reachable Object::getString assertion in AnnotRichMedia class in
Annot.c (CVE-2018-20551)
* poppler: reachable Object::dictLookup assertion in FileSpec class in
FileSpec.cc (CVE-2018-20650)
* poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc (CVE-2018-20662)
* poppler: heap-based buffer over-read in function
downsample_row_box_filter in CairoRescaleBox.cc (CVE-2019-9631)
* poppler: stack consumption in function Dict::find() in Dict.cc
(CVE-2019-9903)
* poppler: integer overflow in JPXStream::init function leading to memory
consumption (CVE-2019-9959)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2018-18897 https://access.redhat.com/security/cve/CVE-2018-20481 https://access.redhat.com/security/cve/CVE-2018-20551 https://access.redhat.com/security/cve/CVE-2018-20650 https://access.redhat.com/security/cve/CVE-2018-20662 https://access.redhat.com/security/cve/CVE-2019-7310 https://access.redhat.com/security/cve/CVE-2019-9200 https://access.redhat.com/security/cve/CVE-2019-9631 https://access.redhat.com/security/cve/CVE-2019-9903 https://access.redhat.com/security/cve/CVE-2019-9959 https://access.redhat.com/security/cve/CVE-2019-10871 https://access.redhat.com/security/cve/CVE-2019-12293 https://access.redhat.com/security/updates/classification/#moderate
Package List
Red Hat Enterprise Linux AppStream (v. 8):
Source:
poppler-0.66.0-11.el8_0.12.src.rpm
aarch64:
poppler-0.66.0-11.el8_0.12.aarch64.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
poppler-debugsource-0.66.0-11.el8_0.12.aarch64.rpm
poppler-glib-0.66.0-11.el8_0.12.aarch64.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
poppler-utils-0.66.0-11.el8_0.12.aarch64.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
ppc64le:
poppler-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-debugsource-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-glib-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-utils-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
s390x:
poppler-0.66.0-11.el8_0.12.s390x.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
poppler-debugsource-0.66.0-11.el8_0.12.s390x.rpm
poppler-glib-0.66.0-11.el8_0.12.s390x.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
poppler-utils-0.66.0-11.el8_0.12.s390x.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
x86_64:
poppler-0.66.0-11.el8_0.12.i686.rpm
poppler-0.66.0-11.el8_0.12.x86_64.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
poppler-debugsource-0.66.0-11.el8_0.12.i686.rpm
poppler-debugsource-0.66.0-11.el8_0.12.x86_64.rpm
poppler-glib-0.66.0-11.el8_0.12.i686.rpm
poppler-glib-0.66.0-11.el8_0.12.x86_64.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
poppler-utils-0.66.0-11.el8_0.12.x86_64.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
Red Hat CodeReady Linux Builder (v. 8):
aarch64:
poppler-cpp-0.66.0-11.el8_0.12.aarch64.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
poppler-cpp-devel-0.66.0-11.el8_0.12.aarch64.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
poppler-debugsource-0.66.0-11.el8_0.12.aarch64.rpm
poppler-devel-0.66.0-11.el8_0.12.aarch64.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
poppler-glib-devel-0.66.0-11.el8_0.12.aarch64.rpm
poppler-qt5-0.66.0-11.el8_0.12.aarch64.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
poppler-qt5-devel-0.66.0-11.el8_0.12.aarch64.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
ppc64le:
poppler-cpp-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-cpp-devel-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-debugsource-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-devel-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-glib-devel-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-qt5-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-qt5-devel-0.66.0-11.el8_0.12.ppc64le.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
s390x:
poppler-cpp-0.66.0-11.el8_0.12.s390x.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
poppler-cpp-devel-0.66.0-11.el8_0.12.s390x.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
poppler-debugsource-0.66.0-11.el8_0.12.s390x.rpm
poppler-devel-0.66.0-11.el8_0.12.s390x.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
poppler-glib-devel-0.66.0-11.el8_0.12.s390x.rpm
poppler-qt5-0.66.0-11.el8_0.12.s390x.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
poppler-qt5-devel-0.66.0-11.el8_0.12.s390x.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
x86_64:
poppler-cpp-0.66.0-11.el8_0.12.i686.rpm
poppler-cpp-0.66.0-11.el8_0.12.x86_64.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-cpp-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
poppler-cpp-devel-0.66.0-11.el8_0.12.i686.rpm
poppler-cpp-devel-0.66.0-11.el8_0.12.x86_64.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
poppler-debugsource-0.66.0-11.el8_0.12.i686.rpm
poppler-debugsource-0.66.0-11.el8_0.12.x86_64.rpm
poppler-devel-0.66.0-11.el8_0.12.i686.rpm
poppler-devel-0.66.0-11.el8_0.12.x86_64.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-glib-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
poppler-glib-devel-0.66.0-11.el8_0.12.i686.rpm
poppler-glib-devel-0.66.0-11.el8_0.12.x86_64.rpm
poppler-qt5-0.66.0-11.el8_0.12.i686.rpm
poppler-qt5-0.66.0-11.el8_0.12.x86_64.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-qt5-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
poppler-qt5-devel-0.66.0-11.el8_0.12.i686.rpm
poppler-qt5-devel-0.66.0-11.el8_0.12.x86_64.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.i686.rpm
poppler-utils-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for poppler is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
Bugs Fixed
1646546 - CVE-2018-18897 poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc
1665259 - CVE-2018-20551 poppler: reachable Object::getString assertion in AnnotRichMedia class in Annot.c
1665263 - CVE-2018-20650 poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc
1665266 - CVE-2018-20481 poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc
1665273 - CVE-2018-20662 poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc
1672419 - CVE-2019-7310 poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc
1683632 - CVE-2019-9200 poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc
1686802 - CVE-2019-9631 poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc
1691724 - CVE-2019-9903 poppler: stack consumption in function Dict::find() in Dict.cc
1696636 - CVE-2019-10871 poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc
1713582 - CVE-2019-12293 poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc
1732340 - CVE-2019-9959 poppler: integer overflow in JPXStream::init function leading to memory consumption