| Summary: | xpdf new security issue CVE-2019-12360 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | andrewsfarm, mageia, mageia, nicolas.salguero, sysadmin-bugs |
| Version: | 7 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA7-64-OK | ||
| Source RPM: | xpdf-4.02-1.1.mga7.src.rpm | CVE: | CVE-2019-12360 |
| Status comment: | |||
|
Description
David Walser
2020-07-08 00:33:22 CEST
David Walser
2020-07-08 00:33:39 CEST
Whiteboard:
(none) =>
MGA7TOO Suggested advisory: ======================== The updated packages fix a security vulnerability: A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content. (CVE-2019-12360) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12360 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/IQBAHQQF2P7E6PL5STST3TGH7VPVXKKQ/ ======================== Updated packages in core/updates_testing: ======================== xpdf-4.02-1.2.mga7 xpdf-common-4.02-1.2.mga7 from SRPMS: xpdf-4.02-1.2.mga7.src.rpm Source RPM:
xpdf-4.02-3.mga8.src.rpm =>
xpdf-4.02-1.1.mga7.src.rpm Installed and tested without issues. Tested on a many pdf files, large and small. No issues found. System: Mageia 7, x86_64, Plasma DE, LXQt DE, Intel CPU, nVidia GPU using nvidia340 proprietary driver. $ uname -a Linux marte 5.6.14-desktop-2.mga7 #1 SMP Wed May 20 23:14:20 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux $ rpm -qa | grep xpdf xpdf-4.02-1.2.mga7 xpdf-common-4.02-1.2.mga7 CC:
(none) =>
mageia Validating. Advisory in Comment 1. CC:
(none) =>
andrewsfarm, sysadmin-bugs
Nicolas Lécureuil
2020-07-10 16:40:30 CEST
CC:
(none) =>
mageia An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2020-0291.html Resolution:
(none) =>
FIXED |