SUSE Security Update: Security update for poppler
______________________________________________________________________________
Announcement ID:    SUSE-SU-2017:1672-1
Rating:             moderate
References:         #1040170 #1042803 
Cross-References:   CVE-2017-9083 CVE-2017-9406
Affected Products:
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
   An update that fixes two vulnerabilities is now available.
Description:
   This update for poppler fixes the following issues:
   - CVE-2017-9406: Fixed a memory leak that occurred while parsing invalid
     XRef attributes (bsc#1042803).
   - CVE-2017-9083: Fixed a memory leak that occurred when the parser tried
     to recover from a broken input file. (bsc#1040170)
Patch Instructions:
   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:
   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1038=1
   - SUSE Linux Enterprise Server 12-SP2:
      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1038=1
   - SUSE Linux Enterprise Desktop 12-SP2:
      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1038=1
   To bring your system up-to-date, use "zypper patch".
Package List:
   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
      libpoppler44-0.24.4-14.3.1
      libpoppler44-debuginfo-0.24.4-14.3.1
   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
      libpoppler44-0.24.4-14.3.1
      libpoppler44-debuginfo-0.24.4-14.3.1
   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
      libpoppler44-0.24.4-14.3.1
      libpoppler44-debuginfo-0.24.4-14.3.1
References:
   https://www.suse.com/security/cve/CVE-2017-9083.html
   https://www.suse.com/security/cve/CVE-2017-9406.html
   https://bugzilla.suse.com/1040170
   https://bugzilla.suse.com/1042803