Mageia 2019-0276: poppler security update

    Date15 Sep 2019
    CategoryMageia
    341
    Posted ByLinuxSecurity Advisories
    The updated packages fix security vulnerabilities: The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap,
    MGASA-2019-0276 - Updated poppler packages fix security vulnerabilities
    
    Publication date: 15 Sep 2019
    URL: https://advisories.mageia.org/MGASA-2019-0276.html
    Type: security
    Affected Mageia releases: 6, 7
    CVE: CVE-2019-9959,
         CVE-2019-10871
    
    The updated packages fix security vulnerabilities:
    
    The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check
    for negative values of stream length, leading to an Integer Overflow,
    thereby making it possible to allocate a large memory chunk on the heap,
    with a size controlled by an attacker, as demonstrated by pdftocairo.
    (CVE-2019-9959)
    
    An issue was discovered in Poppler 0.74.0. There is a heap-based buffer
    over-read in the function PSOutputDev::checkPageSlice at PSOutputDev.cc.
    (CVE-2019-10871)
    
    References:
    - https://bugs.mageia.org/show_bug.cgi?id=25432
    - https://access.redhat.com/errata/RHSA-2019:2713
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871
    
    SRPMS:
    - 7/core/poppler-0.74.0-3.2.mga7
    - 6/core/poppler-0.52.0-3.14.mga6
    

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.