[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1177-1] poppler security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : poppler
Version        : 0.18.4-6+deb7u4
CVE ID         : CVE-2017-14975 CVE-2017-14976 CVE-2017-14977
                 CVE-2017-15565
Debian Bug     : 879066 877952 877954 877957

It was discovered that poppler, a PDF rendering library, was affected
by several denial-of-service (application crash), null pointer
dereferences and heap-based buffer over-read bugs:

CVE-2017-14975
  The FoFiType1C::convertToType0 function in FoFiType1C.cc
  has a NULL pointer dereference vulnerability because a data structure
  is not initialized, which allows an attacker to launch a denial of
  service attack.

CVE-2017-14976
  The FoFiType1C::convertToType0 function in FoFiType1C.cc
  has a heap-based buffer over-read vulnerability if an out-of-bounds
  font dictionary index is encountered, which allows an attacker to
  launch a denial of service attack.

CVE-2017-14977
  The FoFiTrueType::getCFFBlock function in FoFiTrueType.cc
  has a NULL pointer dereference vulnerability due to lack of validation
  of a table pointer, which allows an attacker to launch a denial of
  service attack.

CVE-2017-15565
  NULL Pointer Dereference exists in the GfxImageColorMap::getGrayLine()
  function in GfxState.cc via a crafted PDF document.


For Debian 7 "Wheezy", these problems have been fixed in version
0.18.4-6+deb7u4.

We recommend that you upgrade your poppler packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=oWiP
-----END PGP SIGNATURE-----


Reply to: