[SECURITY] [DLA 1177-1] poppler security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : poppler
Version : 0.18.4-6+deb7u4
CVE ID : CVE-2017-14975 CVE-2017-14976 CVE-2017-14977
CVE-2017-15565
Debian Bug : 879066 877952 877954 877957
It was discovered that poppler, a PDF rendering library, was affected
by several denial-of-service (application crash), null pointer
dereferences and heap-based buffer over-read bugs:
CVE-2017-14975
The FoFiType1C::convertToType0 function in FoFiType1C.cc
has a NULL pointer dereference vulnerability because a data structure
is not initialized, which allows an attacker to launch a denial of
service attack.
CVE-2017-14976
The FoFiType1C::convertToType0 function in FoFiType1C.cc
has a heap-based buffer over-read vulnerability if an out-of-bounds
font dictionary index is encountered, which allows an attacker to
launch a denial of service attack.
CVE-2017-14977
The FoFiTrueType::getCFFBlock function in FoFiTrueType.cc
has a NULL pointer dereference vulnerability due to lack of validation
of a table pointer, which allows an attacker to launch a denial of
service attack.
CVE-2017-15565
NULL Pointer Dereference exists in the GfxImageColorMap::getGrayLine()
function in GfxState.cc via a crafted PDF document.
For Debian 7 "Wheezy", these problems have been fixed in version
0.18.4-6+deb7u4.
We recommend that you upgrade your poppler packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=oWiP
-----END PGP SIGNATURE-----
Reply to: