SUSE-SU-2017:1999-1: moderate: Security update for poppler
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Jul 28 13:09:44 MDT 2017
SUSE Security Update: Security update for poppler
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:1999-1
Rating: moderate
References: #1041783 #1042802 #1042803 #1043088 #1045719
#1045721
Cross-References: CVE-2017-7511 CVE-2017-7515 CVE-2017-9406
CVE-2017-9408 CVE-2017-9775 CVE-2017-9776
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for poppler fixes the following issues:
Security issues fixed:
- CVE-2017-9775: DoS stack buffer overflow in GfxState.cc in pdftocairo
via a crafted PDF document (bsc#1045719)
- CVE-2017-9776: DoS integer overflow leading to heap buffer overflow in
JBIG2Stream.cc via a crafted PDF document (bsc#1045721)
- CVE-2017-7515: Stack exhaustion due to infinite recursive call in
pdfunite (bsc#1043088)
- CVE-2017-7511: Null pointer dereference in pdfunite via crafted
documents (bsc#1041783)
- CVE-2017-9406: Memory leak in the gmalloc function in gmem.cc
(bsc#1042803)
- CVE-2017-9408: Memory leak in the Object::initArray function
(bsc#1042802)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1237=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1237=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1237=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1237=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1237=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1237=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1237=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
libpoppler-cpp0-0.43.0-16.5.1
libpoppler-cpp0-debuginfo-0.43.0-16.5.1
libpoppler-devel-0.43.0-16.5.1
libpoppler-glib-devel-0.43.0-16.5.1
libpoppler-qt4-devel-0.43.0-16.5.1
poppler-debugsource-0.43.0-16.5.1
poppler-qt-debugsource-0.43.0-16.5.1
typelib-1_0-Poppler-0_18-0.43.0-16.5.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
libpoppler-cpp0-0.43.0-16.5.1
libpoppler-cpp0-debuginfo-0.43.0-16.5.1
libpoppler-devel-0.43.0-16.5.1
libpoppler-glib-devel-0.43.0-16.5.1
libpoppler-qt4-devel-0.43.0-16.5.1
poppler-debugsource-0.43.0-16.5.1
poppler-qt-debugsource-0.43.0-16.5.1
typelib-1_0-Poppler-0_18-0.43.0-16.5.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
libpoppler-glib8-0.43.0-16.5.1
libpoppler-glib8-debuginfo-0.43.0-16.5.1
libpoppler-qt4-4-0.43.0-16.5.1
libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
libpoppler60-0.43.0-16.5.1
libpoppler60-debuginfo-0.43.0-16.5.1
poppler-debugsource-0.43.0-16.5.1
poppler-qt-debugsource-0.43.0-16.5.1
poppler-tools-0.43.0-16.5.1
poppler-tools-debuginfo-0.43.0-16.5.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
libpoppler-glib8-0.43.0-16.5.1
libpoppler-glib8-debuginfo-0.43.0-16.5.1
libpoppler-qt4-4-0.43.0-16.5.1
libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
libpoppler60-0.43.0-16.5.1
libpoppler60-debuginfo-0.43.0-16.5.1
poppler-debugsource-0.43.0-16.5.1
poppler-qt-debugsource-0.43.0-16.5.1
poppler-tools-0.43.0-16.5.1
poppler-tools-debuginfo-0.43.0-16.5.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
libpoppler-glib8-0.43.0-16.5.1
libpoppler-glib8-debuginfo-0.43.0-16.5.1
libpoppler-qt4-4-0.43.0-16.5.1
libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
libpoppler60-0.43.0-16.5.1
libpoppler60-debuginfo-0.43.0-16.5.1
poppler-debugsource-0.43.0-16.5.1
poppler-qt-debugsource-0.43.0-16.5.1
poppler-tools-0.43.0-16.5.1
poppler-tools-debuginfo-0.43.0-16.5.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
libpoppler-glib8-0.43.0-16.5.1
libpoppler-glib8-debuginfo-0.43.0-16.5.1
libpoppler-qt4-4-0.43.0-16.5.1
libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
libpoppler60-0.43.0-16.5.1
libpoppler60-debuginfo-0.43.0-16.5.1
poppler-debugsource-0.43.0-16.5.1
poppler-qt-debugsource-0.43.0-16.5.1
poppler-tools-0.43.0-16.5.1
poppler-tools-debuginfo-0.43.0-16.5.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
libpoppler-glib8-0.43.0-16.5.1
libpoppler-glib8-debuginfo-0.43.0-16.5.1
libpoppler-qt4-4-0.43.0-16.5.1
libpoppler-qt4-4-debuginfo-0.43.0-16.5.1
libpoppler60-0.43.0-16.5.1
libpoppler60-debuginfo-0.43.0-16.5.1
poppler-debugsource-0.43.0-16.5.1
poppler-qt-debugsource-0.43.0-16.5.1
poppler-tools-0.43.0-16.5.1
poppler-tools-debuginfo-0.43.0-16.5.1
References:
https://www.suse.com/security/cve/CVE-2017-7511.html
https://www.suse.com/security/cve/CVE-2017-7515.html
https://www.suse.com/security/cve/CVE-2017-9406.html
https://www.suse.com/security/cve/CVE-2017-9408.html
https://www.suse.com/security/cve/CVE-2017-9775.html
https://www.suse.com/security/cve/CVE-2017-9776.html
https://bugzilla.suse.com/1041783
https://bugzilla.suse.com/1042802
https://bugzilla.suse.com/1042803
https://bugzilla.suse.com/1043088
https://bugzilla.suse.com/1045719
https://bugzilla.suse.com/1045721
More information about the sle-security-updates
mailing list