Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:0494-1

Опубликовано: 23 фев. 2023
Источник: suse-cvrf

Описание

Security update for poppler

This update for poppler fixes the following issues:

  • CVE-2022-38784: Fixed integer overflow in the JBIG2 decoder (bsc#1202692).
  • CVE-2019-13283: Fixed heap-based buffer over-read that could be triggered by sending a crafted PDF document to the pdftotext tool (bsc#1140877).

Список пакетов

SUSE Linux Enterprise Server 12 SP2-BCL
libpoppler-glib8-0.43.0-16.22.1
libpoppler-qt4-4-0.43.0-16.22.1
libpoppler60-0.43.0-16.22.1
poppler-tools-0.43.0-16.22.1
SUSE Linux Enterprise Server 12 SP4-ESPOS
libpoppler-glib8-0.43.0-16.22.1
libpoppler-qt4-4-0.43.0-16.22.1
libpoppler60-0.43.0-16.22.1
poppler-tools-0.43.0-16.22.1
SUSE Linux Enterprise Server 12 SP4-LTSS
libpoppler-glib8-0.43.0-16.22.1
libpoppler-qt4-4-0.43.0-16.22.1
libpoppler60-0.43.0-16.22.1
poppler-tools-0.43.0-16.22.1
SUSE Linux Enterprise Server 12 SP5
libpoppler-glib8-0.43.0-16.22.1
libpoppler-qt4-4-0.43.0-16.22.1
libpoppler60-0.43.0-16.22.1
poppler-tools-0.43.0-16.22.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
libpoppler-glib8-0.43.0-16.22.1
libpoppler-qt4-4-0.43.0-16.22.1
libpoppler60-0.43.0-16.22.1
poppler-tools-0.43.0-16.22.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
libpoppler-glib8-0.43.0-16.22.1
libpoppler-qt4-4-0.43.0-16.22.1
libpoppler60-0.43.0-16.22.1
poppler-tools-0.43.0-16.22.1
SUSE Linux Enterprise Software Development Kit 12 SP5
libpoppler-cpp0-0.43.0-16.22.1
libpoppler-devel-0.43.0-16.22.1
libpoppler-glib-devel-0.43.0-16.22.1
libpoppler-qt4-devel-0.43.0-16.22.1
typelib-1_0-Poppler-0_18-0.43.0-16.22.1
SUSE OpenStack Cloud 9
libpoppler-glib8-0.43.0-16.22.1
libpoppler-qt4-4-0.43.0-16.22.1
libpoppler60-0.43.0-16.22.1
poppler-tools-0.43.0-16.22.1
SUSE OpenStack Cloud Crowbar 9
libpoppler-glib8-0.43.0-16.22.1
libpoppler-qt4-4-0.43.0-16.22.1
libpoppler60-0.43.0-16.22.1
poppler-tools-0.43.0-16.22.1

Описание

In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in strncpy from FoFiType1::parse in fofi/FoFiType1.cc because it does not ensure the source string has a valid length before making a fixed-length copy. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:libpoppler-glib8-0.43.0-16.22.1
SUSE Linux Enterprise Server 12 SP2-BCL:libpoppler-qt4-4-0.43.0-16.22.1
SUSE Linux Enterprise Server 12 SP2-BCL:libpoppler60-0.43.0-16.22.1
SUSE Linux Enterprise Server 12 SP2-BCL:poppler-tools-0.43.0-16.22.1

Ссылки

Описание

Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:libpoppler-glib8-0.43.0-16.22.1
SUSE Linux Enterprise Server 12 SP2-BCL:libpoppler-qt4-4-0.43.0-16.22.1
SUSE Linux Enterprise Server 12 SP2-BCL:libpoppler60-0.43.0-16.22.1
SUSE Linux Enterprise Server 12 SP2-BCL:poppler-tools-0.43.0-16.22.1

Ссылки