| Summary: | poppler new security issues CVE-2017-751[15], CVE-2017-940[68], CVE-2017-977[56], CVE-2017-9865 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | mageia, marja11, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | advisory MGA5-64-OK | ||
| Source RPM: | poppler-0.26.5-2.1.mga5.src.rpm | CVE: | |
| Status comment: | |||
| Bug Depends on: | 21516 | ||
| Bug Blocks: | |||
|
Description
David Walser
2017-06-07 12:43:10 CEST
Assigning to all packagers collectively, since there is no registered maintainer for this package. CC:
(none) =>
marja11 Ubuntu has issued an advisory on July 7: https://www.ubuntu.com/usn/usn-3350-1/ CVE-2017-2820 and CVE-2017-9083 don't affect us since we building against openjpeg. CVE-2017-7511 had previously been fixed in Cauldron. CVE-2017-7515, CVE-2017-9406, CVE-2017-9408, CVE-2017-9775 have now been patched in Cauldron (awaiting freeze push). Summary:
poppler new security issue CVE-2017-7511 =>
poppler new security issues CVE-2017-7511, CVE-2017-7515, CVE-2017-9406, CVE-2017-9408, CVE-2017-9775 Patched package uploaded for Mageia 5. Advisory: ======================== Updated poppler packages fix security vulnerabilities: Jiaqi Peng discovered that the poppler pdfunite tool incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to crash, resulting in a denial of service (CVE-2017-7511). It was discovered that the poppler pdfunite tool incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to hang, resulting in a denial of service (CVE-2017-7515). It was discovered that poppler incorrectly handled memory when processing PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to consume resources, resulting in a denial of service (CVE-2017-9406, CVE-2017-9408). Alberto Garcia, Francisco Oca, and Suleman Ali discovered that the poppler pdftocairo tool incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to crash, resulting in a denial of service (CVE-2017-9775). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7511 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7515 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/MPWSH7JKKVEIEQEEILCRHTF7HL7BSYW4/ https://www.ubuntu.com/usn/usn-3350-1/ ======================== Updated packages in core/updates_testing: ======================== poppler-0.26.5-2.2.mga5 libpoppler46-0.26.5-2.2.mga5 libpoppler-devel-0.26.5-2.2.mga5 libpoppler-cpp0-0.26.5-2.2.mga5 libpoppler-qt4-devel-0.26.5-2.2.mga5 libpoppler-qt5-devel-0.26.5-2.2.mga5 libpoppler-qt4_4-0.26.5-2.2.mga5 libpoppler-qt5_1-0.26.5-2.2.mga5 libpoppler-glib8-0.26.5-2.2.mga5 libpoppler-gir0.18-0.26.5-2.2.mga5 libpoppler-glib-devel-0.26.5-2.2.mga5 libpoppler-cpp-devel-0.26.5-2.2.mga5 poppler-0.26.5-2.2.mga5.src.rpm Assignee:
pkg-bugs =>
qa-bugs Fedora has issued an advisory for this on July 16: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/7G2XFEFF6S2H4DRDPUXBUWPEEDGE37EG/ It includes two more CVEs: CVE-2017-9776 and CVE-2017-9865. I may need to add more patches. Whiteboard:
(none) =>
feedback Installed and tested the various pdf* commands without issues. System: Mageia 5, x86_64, Plasma, Intel CPU, nVidia GPU using proprietary driver nvidia340. $ uname -a Linux marte 4.4.79-desktop-1.mga5 #1 SMP Fri Jul 28 02:50:06 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux $ rpm -qa | grep poppler | sort lib64poppler46-0.26.5-2.2.mga5 lib64poppler-glib8-0.26.5-2.2.mga5 lib64poppler-qt4_4-0.26.5-2.2.mga5 poppler-0.26.5-2.2.mga5 Whiteboard:
feedback =>
feedback MGA5-64-OK Advisory: ======================== Updated poppler packages fix security vulnerabilities: Jiaqi Peng discovered that the poppler pdfunite tool incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to crash, resulting in a denial of service (CVE-2017-7511). It was discovered that the poppler pdfunite tool incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to hang, resulting in a denial of service (CVE-2017-7515). It was discovered that poppler incorrectly handled memory when processing PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to consume resources, resulting in a denial of service (CVE-2017-9406, CVE-2017-9408). Alberto Garcia, Francisco Oca, and Suleman Ali discovered that the poppler pdftocairo tool incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to crash, resulting in a denial of service (CVE-2017-9775). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7511 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7515 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/MPWSH7JKKVEIEQEEILCRHTF7HL7BSYW4/ https://www.ubuntu.com/usn/usn-3350-1/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/7G2XFEFF6S2H4DRDPUXBUWPEEDGE37EG/ ======================== Updated packages in core/updates_testing: ======================== poppler-0.26.5-2.3.mga5 libpoppler46-0.26.5-2.3.mga5 libpoppler-devel-0.26.5-2.3.mga5 libpoppler-cpp0-0.26.5-2.3.mga5 libpoppler-qt4-devel-0.26.5-2.3.mga5 libpoppler-qt5-devel-0.26.5-2.3.mga5 libpoppler-qt4_4-0.26.5-2.3.mga5 libpoppler-qt5_1-0.26.5-2.3.mga5 libpoppler-glib8-0.26.5-2.3.mga5 libpoppler-gir0.18-0.26.5-2.3.mga5 libpoppler-glib-devel-0.26.5-2.3.mga5 libpoppler-cpp-devel-0.26.5-2.3.mga5 from poppler-0.26.5-2.3.mga5.src.rpm Summary:
poppler new security issues CVE-2017-7511, CVE-2017-7515, CVE-2017-9406, CVE-2017-9408, CVE-2017-9775 =>
poppler new security issues CVE-2017-751[15], CVE-2017-940[68], CVE-2017-977[56], CVE-2017-9865 Patched package uploaded for Mageia 5 to fix the issues from Comment 4. Advisory: ======================== Updated poppler packages fix security vulnerabilities: Jiaqi Peng discovered that the poppler pdfunite tool incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to crash, resulting in a denial of service (CVE-2017-7511). It was discovered that the poppler pdfunite tool incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to hang, resulting in a denial of service (CVE-2017-7515). It was discovered that poppler incorrectly handled memory when processing PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to consume resources, resulting in a denial of service (CVE-2017-9406, CVE-2017-9408). Alberto Garcia, Francisco Oca, and Suleman Ali discovered that the poppler pdftocairo tool incorrectly parsed certain malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause poppler to crash, resulting in a denial of service (CVE-2017-9775). Integer overflow leading to Heap buffer overflow in JBIG2Stream.cc in pdftocairo in Poppler allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document (CVE-2017-9776). The function GfxImageColorMap::getGray in GfxState.cc in Poppler allows attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted PDF document, related to missing color-map validation in ImageOutputDev.cc (CVE-2017-9865). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7511 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7515 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/MPWSH7JKKVEIEQEEILCRHTF7HL7BSYW4/ https://www.ubuntu.com/usn/usn-3350-1/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/7G2XFEFF6S2H4DRDPUXBUWPEEDGE37EG/ ======================== Updated packages in core/updates_testing: ======================== poppler-0.26.5-2.3.mga5 libpoppler46-0.26.5-2.3.mga5 libpoppler-devel-0.26.5-2.3.mga5 libpoppler-cpp0-0.26.5-2.3.mga5 libpoppler-qt4-devel-0.26.5-2.3.mga5 libpoppler-qt5-devel-0.26.5-2.3.mga5 libpoppler-qt4_4-0.26.5-2.3.mga5 libpoppler-qt5_1-0.26.5-2.3.mga5 libpoppler-glib8-0.26.5-2.3.mga5 libpoppler-gir0.18-0.26.5-2.3.mga5 libpoppler-glib-devel-0.26.5-2.3.mga5 libpoppler-cpp-devel-0.26.5-2.3.mga5 from poppler-0.26.5-2.3.mga5.src.rpm
David Walser
2017-08-13 17:29:36 CEST
Depends on:
(none) =>
21516 Installed and tested the various pdf* commands without issues. System: Mageia 5, x86_64, Plasma, Intel CPU, nVidia GPU using proprietary driver nvidia340. $ uname -a Linux marte 4.4.82-desktop-1.mga5 #1 SMP Sun Aug 13 18:03:58 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux $ rpm -qa | grep poppler poppler-0.26.5-2.3.mga5 lib64poppler-qt4_4-0.26.5-2.3.mga5 lib64poppler46-0.26.5-2.3.mga5 lib64poppler-glib8-0.26.5-2.3.mga5 Whiteboard:
(none) =>
MGA5-64-OK Advisory uploaded, validating. Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2017-0276.html Status:
NEW =>
RESOLVED |