Back to poppler PTS page

Accepted poppler 0.48.0-2+deb9u4 (source) into oldstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 08 Nov 2020 17:12:52 +0100
Source: poppler
Binary: libpoppler64 libpoppler-dev libpoppler-private-dev libpoppler-glib8 libpoppler-glib-dev libpoppler-glib-doc gir1.2-poppler-0.18 libpoppler-qt4-4 libpoppler-qt4-dev libpoppler-qt5-1 libpoppler-qt5-dev libpoppler-cpp0v5 libpoppler-cpp-dev poppler-utils poppler-dbg
Architecture: source
Version: 0.48.0-2+deb9u4
Distribution: stretch-security
Urgency: high
Maintainer: Loic Minier <lool@dooz.org>
Changed-By: Markus Koschany <apo@debian.org>
Description:
 gir1.2-poppler-0.18 - GObject introspection data for poppler-glib
 libpoppler-cpp-dev - PDF rendering library -- development files (CPP interface)
 libpoppler-cpp0v5 - PDF rendering library (CPP shared library)
 libpoppler-dev - PDF rendering library -- development files
 libpoppler-glib-dev - PDF rendering library -- development files (GLib interface)
 libpoppler-glib-doc - PDF rendering library -- documentation for the GLib interface
 libpoppler-glib8 - PDF rendering library (GLib-based shared library)
 libpoppler-private-dev - PDF rendering library -- private development files
 libpoppler-qt4-4 - PDF rendering library (Qt 4 based shared library)
 libpoppler-qt4-dev - PDF rendering library -- development files (Qt 4 interface)
 libpoppler-qt5-1 - PDF rendering library (Qt 5 based shared library)
 libpoppler-qt5-dev - PDF rendering library -- development files (Qt 5 interface)
 libpoppler64 - PDF rendering library
 poppler-dbg - PDF rendering library -- debugging symbols
 poppler-utils - PDF utilities (based on Poppler)
Changes:
 poppler (0.48.0-2+deb9u4) stretch-security; urgency=high
 .
   * Non-maintainer upload by the LTS team.
   * CVE-2019-9959:
     The JPXStream::init function in Poppler doesn't check for negative values
     of stream length, leading to an Integer Overflow, thereby making it
     possible to allocate a large memory chunk on the heap, with a size
     controlled by an attacker, as demonstrated by pdftocairo.
   * CVE-2019-7310:
     In Poppler, a heap-based buffer over-read (due to an integer signedness
     error in the XRef::getEntry function in XRef.cc) allows remote attackers to
     cause a denial of service (application crash) or possibly have unspecified
     other impact via a crafted PDF document, as demonstrated by pdftocairo.
   * CVE-2019-14494:
     There is a divide-by-zero error in the function
     SplashOutputDev::tilingPatternFill at SplashOutputDev.cc.
   * CVE-2019-10018:
     There is an FPE in the function PostScriptFunction::exec at Function.cc for
     the psOpIdiv case.
   * CVE-2018-20662:
     PDFDoc::setup in PDFDoc.cc allows attackers to cause a denial-of-service
     (application crash caused by Object.h SIGABRT, because of a wrong return
     value from PDFDoc::setup) by crafting a PDF file in which an xref data
     structure is mishandled during extractPDFSubtype processing.
   * CVE-2018-20650:
     A reachable Object::dictLookup assertion in Poppler allows attackers to
     cause a denial of service due to the lack of a check for the dict data
     type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in
     pdfdetach.
   * CVE-2018-19058:
     There is a reachable abort in Object.h, which will lead to denial of
     service because EmbFile::save2 in FileSpec.cc lacks a stream check before
     saving an embedded file.
   * CVE-2017-14928:
     A NULL Pointer Dereference exists in
     AnnotRichMedia::Configuration::Configuration in Annot.cc via a crafted PDF
     document.
   * CVE-2017-14926:
     In Poppler 0.59.0, a NULL Pointer Dereference exists in
     AnnotRichMedia::Content::Content in Annot.cc via a crafted PDF document.
Checksums-Sha1:
 6b134fe4590957489146ae13dd8f8a00490fec0c 3559 poppler_0.48.0-2+deb9u4.dsc
 9d4b1952dbcd991cb12fe2f08fa6d83b39629535 48360 poppler_0.48.0-2+deb9u4.debian.tar.xz
 ccfab7899e59098b208ceead7f7add63ee524358 18166 poppler_0.48.0-2+deb9u4_amd64.buildinfo
Checksums-Sha256:
 05ecb7e94c05b63ca9a4fd71d5fa54eecf531292478d1aa654d6491fbc7543d3 3559 poppler_0.48.0-2+deb9u4.dsc
 c20ba2c5b1967c051f1e6acfae1f75aa5440b79c29b06c5bc776bf049f3b5a7f 48360 poppler_0.48.0-2+deb9u4.debian.tar.xz
 1c4c367cffccc87f10e3c6dd5f3572fe2030d2d7b86aedfa4fe8b091bf628f55 18166 poppler_0.48.0-2+deb9u4_amd64.buildinfo
Files:
 788d279f146324e0828a83041d946a64 3559 devel optional poppler_0.48.0-2+deb9u4.dsc
 298ccaa5dcda68659a4e605a87bfead0 48360 devel optional poppler_0.48.0-2+deb9u4.debian.tar.xz
 5b38e905a09ff5d79b468008811c41fa 18166 devel optional poppler_0.48.0-2+deb9u4_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=1wTb
-----END PGP SIGNATURE-----