RedHat: RHSA-2019-2713:01 Moderate: poppler security update

    Date11 Sep 2019
    CategoryRed Hat
    370
    Posted ByLinuxSecurity Advisories
    An update for poppler is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: poppler security update
    Advisory ID:       RHSA-2019:2713-01
    Product:           Red Hat Enterprise Linux
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2713
    Issue date:        2019-09-10
    CVE Names:         CVE-2018-18897 CVE-2018-20481 CVE-2018-20551 
                       CVE-2018-20650 CVE-2018-20662 CVE-2019-7310 
                       CVE-2019-9200 CVE-2019-9631 CVE-2019-9903 
                       CVE-2019-9959 CVE-2019-10871 CVE-2019-12293 
    =====================================================================
    
    1. Summary:
    
    An update for poppler is now available for Red Hat Enterprise Linux 8.
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64
    Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
    
    3. Description:
    
    Poppler is a Portable Document Format (PDF) rendering library, used by
    applications such as Evince.
    
    Security Fix(es):
    
    * poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc
    (CVE-2019-7310)
    
    * poppler: heap-based buffer overflow in function ImageStream::getLine() in
    Stream.cc (CVE-2019-9200)
    
    * poppler: heap-based buffer over-read in function
    PSOutputDev::checkPageSlice in PSOutputDev.cc (CVE-2019-10871)
    
    * poppler: heap-based buffer over-read in JPXStream::init in
    JPEG2000Stream.cc (CVE-2019-12293)
    
    * poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc
    (CVE-2018-18897)
    
    * poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc
    (CVE-2018-20481)
    
    * poppler: reachable Object::getString assertion in AnnotRichMedia class in
    Annot.c (CVE-2018-20551)
    
    * poppler: reachable Object::dictLookup assertion in FileSpec class in
    FileSpec.cc (CVE-2018-20650)
    
    * poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc (CVE-2018-20662)
    
    * poppler: heap-based buffer over-read in function
    downsample_row_box_filter in CairoRescaleBox.cc (CVE-2019-9631)
    
    * poppler: stack consumption in function Dict::find() in Dict.cc
    (CVE-2019-9903)
    
    * poppler: integer overflow in JPXStream::init function leading to memory
    consumption (CVE-2019-9959)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, acknowledgments, and other related information, refer to the CVE
    page(s) listed in the References section.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1646546 - CVE-2018-18897 poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc
    1665259 - CVE-2018-20551 poppler: reachable Object::getString assertion in AnnotRichMedia class in Annot.c
    1665263 - CVE-2018-20650 poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc
    1665266 - CVE-2018-20481 poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc
    1665273 - CVE-2018-20662 poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc
    1672419 - CVE-2019-7310 poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc
    1683632 - CVE-2019-9200 poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc
    1686802 - CVE-2019-9631 poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc
    1691724 - CVE-2019-9903 poppler: stack consumption in function Dict::find() in Dict.cc
    1696636 - CVE-2019-10871 poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc
    1713582 - CVE-2019-12293 poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc
    1732340 - CVE-2019-9959 poppler: integer overflow in JPXStream::init function leading to memory consumption
    
    6. Package List:
    
    Red Hat Enterprise Linux AppStream (v. 8):
    
    Source:
    poppler-0.66.0-11.el8_0.12.src.rpm
    
    aarch64:
    poppler-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-glib-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-utils-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    
    ppc64le:
    poppler-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-glib-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-utils-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    
    s390x:
    poppler-0.66.0-11.el8_0.12.s390x.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.s390x.rpm
    poppler-glib-0.66.0-11.el8_0.12.s390x.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    poppler-utils-0.66.0-11.el8_0.12.s390x.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    
    x86_64:
    poppler-0.66.0-11.el8_0.12.i686.rpm
    poppler-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.i686.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-glib-0.66.0-11.el8_0.12.i686.rpm
    poppler-glib-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-utils-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    
    Red Hat CodeReady Linux Builder (v. 8):
    
    aarch64:
    poppler-cpp-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-cpp-devel-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-devel-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-glib-devel-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-qt5-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-qt5-devel-0.66.0-11.el8_0.12.aarch64.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm
    
    ppc64le:
    poppler-cpp-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-cpp-devel-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-devel-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-glib-devel-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-qt5-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-qt5-devel-0.66.0-11.el8_0.12.ppc64le.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm
    
    s390x:
    poppler-cpp-0.66.0-11.el8_0.12.s390x.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    poppler-cpp-devel-0.66.0-11.el8_0.12.s390x.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.s390x.rpm
    poppler-devel-0.66.0-11.el8_0.12.s390x.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    poppler-glib-devel-0.66.0-11.el8_0.12.s390x.rpm
    poppler-qt5-0.66.0-11.el8_0.12.s390x.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    poppler-qt5-devel-0.66.0-11.el8_0.12.s390x.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.s390x.rpm
    
    x86_64:
    poppler-cpp-0.66.0-11.el8_0.12.i686.rpm
    poppler-cpp-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-cpp-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-cpp-devel-0.66.0-11.el8_0.12.i686.rpm
    poppler-cpp-devel-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.i686.rpm
    poppler-debugsource-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-devel-0.66.0-11.el8_0.12.i686.rpm
    poppler-devel-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-glib-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-glib-devel-0.66.0-11.el8_0.12.i686.rpm
    poppler-glib-devel-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-qt5-0.66.0-11.el8_0.12.i686.rpm
    poppler-qt5-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-qt5-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-qt5-devel-0.66.0-11.el8_0.12.i686.rpm
    poppler-qt5-devel-0.66.0-11.el8_0.12.x86_64.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.i686.rpm
    poppler-utils-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2018-18897
    https://access.redhat.com/security/cve/CVE-2018-20481
    https://access.redhat.com/security/cve/CVE-2018-20551
    https://access.redhat.com/security/cve/CVE-2018-20650
    https://access.redhat.com/security/cve/CVE-2018-20662
    https://access.redhat.com/security/cve/CVE-2019-7310
    https://access.redhat.com/security/cve/CVE-2019-9200
    https://access.redhat.com/security/cve/CVE-2019-9631
    https://access.redhat.com/security/cve/CVE-2019-9903
    https://access.redhat.com/security/cve/CVE-2019-9959
    https://access.redhat.com/security/cve/CVE-2019-10871
    https://access.redhat.com/security/cve/CVE-2019-12293
    https://access.redhat.com/security/updates/classification/#moderate
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXXi/19zjgjWX9erEAQiPdw/+LtA/G5SgnDzFpdhpxOa9X+noX5a+2dXO
    Qiheg9ozVvajD+4qp2dUwq2r53dLH0tDeCt6wl0YIvUmfE3+UBPIuJG7ijD5GVg5
    p+PdxeGm9NcpusPTLn3c2pkxW7XM6emrd/l+7ImmTvqaCeug8nEp5PVXuYSYajC1
    gxvKxWq170qmiRBTC7ONzQy3cPWRliDZvw4ELtriuzXNveiur5+eBX1kcp5jCKhR
    rjQvXLVgnng62+xUX5fsBVf1DjJ0Elg8n3Uo7kbC1AhlmhuEHLD1seyYWRQYoIM3
    NCfwY+wu+rxHVXnr1k85OJZfWDK91qKScm61AZin1jsNu6H5NDTmbCn9mbZWw6RN
    G9xm+GbRC+bdv5bqAsVRZTC1+LRXexvE3QbmQIX3iqdNOlE8dFjWChpUBdzxGppA
    pNBm4boBMz45UVbZT0oC1A3sZfpNpKO7LkZZsNxRKBaUvbahTNIU/eYj9g2IdKoc
    7mqYKRg95TugEThs1v+ie2zEJR5aLTbHKXplhiBKwoYhTlkZ3+ke61zkFm/jm9eZ
    PwutkfaXhExPbt0ph9HxkxmersNNJii0AYt8c37oRBPBEvnl6yy3i79Y2ds51wdo
    +qTH0WHlwVpL50PMGMl7yXyw9CraIc1GDDOAHJbc+y7VbCJ5Cu3QCX802ql48i79
    57WGrb+WGyE=
    =T3jS
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"13","type":"x","order":"1","pct":56.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":13.04,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"7","type":"x","order":"3","pct":30.43,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.