SUSE-SU-2017:1999-1: moderate: Security update for poppler

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Jul 28 13:09:44 MDT 2017


   SUSE Security Update: Security update for poppler
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:1999-1
Rating:             moderate
References:         #1041783 #1042802 #1042803 #1043088 #1045719 
                    #1045721 
Cross-References:   CVE-2017-7511 CVE-2017-7515 CVE-2017-9406
                    CVE-2017-9408 CVE-2017-9775 CVE-2017-9776
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

   An update that fixes 6 vulnerabilities is now available.

Description:

   This update for poppler fixes the following issues:

   Security issues fixed:
   - CVE-2017-9775: DoS stack buffer overflow in GfxState.cc in pdftocairo
     via a crafted PDF document (bsc#1045719)
   - CVE-2017-9776: DoS integer overflow leading to heap buffer overflow in
     JBIG2Stream.cc via a crafted PDF document (bsc#1045721)
   - CVE-2017-7515: Stack exhaustion due to infinite recursive call in
     pdfunite (bsc#1043088)
   - CVE-2017-7511: Null pointer dereference in pdfunite via crafted
     documents (bsc#1041783)
   - CVE-2017-9406: Memory leak in the gmalloc function in gmem.cc
     (bsc#1042803)
   - CVE-2017-9408: Memory leak in the Object::initArray function
     (bsc#1042802)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1237=1

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1237=1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1237=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1237=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1237=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1237=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1237=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      libpoppler-cpp0-0.43.0-16.5.1
      libpoppler-cpp0-debuginfo-0.43.0-16.5.1
      libpoppler-devel-0.43.0-16.5.1
      libpoppler-glib-devel-0.43.0-16.5.1
      libpoppler-qt4-devel-0.43.0-16.5.1
      poppler-debugsource-0.43.0-16.5.1
      poppler-qt-debugsource-0.43.0-16.5.1
      typelib-1_0-Poppler-0_18-0.43.0-16.5.1

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      libpoppler-cpp0-0.43.0-16.5.1
      libpoppler-cpp0-debuginfo-0.43.0-16.5.1
      libpoppler-devel-0.43.0-16.5.1
      libpoppler-glib-devel-0.43.0-16.5.1
      libpoppler-qt4-devel-0.43.0-16.5.1
      poppler-debugsource-0.43.0-16.5.1
      poppler-qt-debugsource-0.43.0-16.5.1
      typelib-1_0-Poppler-0_18-0.43.0-16.5.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      libpoppler-glib8-0.43.0-16.5.1
      libpoppler-glib8-debuginfo-0.43.0-16.5.1
      libpoppler-qt4-4-0.43.0-16.5.1
      libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
      libpoppler60-0.43.0-16.5.1
      libpoppler60-debuginfo-0.43.0-16.5.1
      poppler-debugsource-0.43.0-16.5.1
      poppler-qt-debugsource-0.43.0-16.5.1
      poppler-tools-0.43.0-16.5.1
      poppler-tools-debuginfo-0.43.0-16.5.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      libpoppler-glib8-0.43.0-16.5.1
      libpoppler-glib8-debuginfo-0.43.0-16.5.1
      libpoppler-qt4-4-0.43.0-16.5.1
      libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
      libpoppler60-0.43.0-16.5.1
      libpoppler60-debuginfo-0.43.0-16.5.1
      poppler-debugsource-0.43.0-16.5.1
      poppler-qt-debugsource-0.43.0-16.5.1
      poppler-tools-0.43.0-16.5.1
      poppler-tools-debuginfo-0.43.0-16.5.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

      libpoppler-glib8-0.43.0-16.5.1
      libpoppler-glib8-debuginfo-0.43.0-16.5.1
      libpoppler-qt4-4-0.43.0-16.5.1
      libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
      libpoppler60-0.43.0-16.5.1
      libpoppler60-debuginfo-0.43.0-16.5.1
      poppler-debugsource-0.43.0-16.5.1
      poppler-qt-debugsource-0.43.0-16.5.1
      poppler-tools-0.43.0-16.5.1
      poppler-tools-debuginfo-0.43.0-16.5.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      libpoppler-glib8-0.43.0-16.5.1
      libpoppler-glib8-debuginfo-0.43.0-16.5.1
      libpoppler-qt4-4-0.43.0-16.5.1
      libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
      libpoppler60-0.43.0-16.5.1
      libpoppler60-debuginfo-0.43.0-16.5.1
      poppler-debugsource-0.43.0-16.5.1
      poppler-qt-debugsource-0.43.0-16.5.1
      poppler-tools-0.43.0-16.5.1
      poppler-tools-debuginfo-0.43.0-16.5.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      libpoppler-glib8-0.43.0-16.5.1
      libpoppler-glib8-debuginfo-0.43.0-16.5.1
      libpoppler-qt4-4-0.43.0-16.5.1
      libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
      libpoppler60-0.43.0-16.5.1
      libpoppler60-debuginfo-0.43.0-16.5.1
      poppler-debugsource-0.43.0-16.5.1
      poppler-qt-debugsource-0.43.0-16.5.1
      poppler-tools-0.43.0-16.5.1
      poppler-tools-debuginfo-0.43.0-16.5.1


References:

   https://www.suse.com/security/cve/CVE-2017-7511.html
   https://www.suse.com/security/cve/CVE-2017-7515.html
   https://www.suse.com/security/cve/CVE-2017-9406.html
   https://www.suse.com/security/cve/CVE-2017-9408.html
   https://www.suse.com/security/cve/CVE-2017-9775.html
   https://www.suse.com/security/cve/CVE-2017-9776.html
   https://bugzilla.suse.com/1041783
   https://bugzilla.suse.com/1042802
   https://bugzilla.suse.com/1042803
   https://bugzilla.suse.com/1043088
   https://bugzilla.suse.com/1045719
   https://bugzilla.suse.com/1045721



More information about the sle-security-updates mailing list