Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3467 Moderate: poppler security update 12 September 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: poppler Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 8 Red Hat Enterprise Linux WS/Desktop 8 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-12293 CVE-2019-10871 CVE-2019-9959 CVE-2019-9903 CVE-2019-9631 CVE-2019-9200 CVE-2019-7310 CVE-2018-20662 CVE-2018-20650 CVE-2018-20551 CVE-2018-20481 CVE-2018-18897 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:2713 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: poppler security update Advisory ID: RHSA-2019:2713-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:2713 Issue date: 2019-09-10 CVE Names: CVE-2018-18897 CVE-2018-20481 CVE-2018-20551 CVE-2018-20650 CVE-2018-20662 CVE-2019-7310 CVE-2019-9200 CVE-2019-9631 CVE-2019-9903 CVE-2019-9959 CVE-2019-10871 CVE-2019-12293 ===================================================================== 1. Summary: An update for poppler is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc (CVE-2019-7310) * poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc (CVE-2019-9200) * poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc (CVE-2019-10871) * poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc (CVE-2019-12293) * poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc (CVE-2018-18897) * poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc (CVE-2018-20481) * poppler: reachable Object::getString assertion in AnnotRichMedia class in Annot.c (CVE-2018-20551) * poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc (CVE-2018-20650) * poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc (CVE-2018-20662) * poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc (CVE-2019-9631) * poppler: stack consumption in function Dict::find() in Dict.cc (CVE-2019-9903) * poppler: integer overflow in JPXStream::init function leading to memory consumption (CVE-2019-9959) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1646546 - CVE-2018-18897 poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc 1665259 - CVE-2018-20551 poppler: reachable Object::getString assertion in AnnotRichMedia class in Annot.c 1665263 - CVE-2018-20650 poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc 1665266 - CVE-2018-20481 poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc 1665273 - CVE-2018-20662 poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc 1672419 - CVE-2019-7310 poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc 1683632 - CVE-2019-9200 poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc 1686802 - CVE-2019-9631 poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc 1691724 - CVE-2019-9903 poppler: stack consumption in function Dict::find() in Dict.cc 1696636 - CVE-2019-10871 poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc 1713582 - CVE-2019-12293 poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc 1732340 - CVE-2019-9959 poppler: integer overflow in JPXStream::init function leading to memory consumption 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: poppler-0.66.0-11.el8_0.12.src.rpm aarch64: poppler-0.66.0-11.el8_0.12.aarch64.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm poppler-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm poppler-debugsource-0.66.0-11.el8_0.12.aarch64.rpm poppler-glib-0.66.0-11.el8_0.12.aarch64.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm poppler-utils-0.66.0-11.el8_0.12.aarch64.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm ppc64le: poppler-0.66.0-11.el8_0.12.ppc64le.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm poppler-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm poppler-debugsource-0.66.0-11.el8_0.12.ppc64le.rpm poppler-glib-0.66.0-11.el8_0.12.ppc64le.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm poppler-utils-0.66.0-11.el8_0.12.ppc64le.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm s390x: poppler-0.66.0-11.el8_0.12.s390x.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.s390x.rpm poppler-debuginfo-0.66.0-11.el8_0.12.s390x.rpm poppler-debugsource-0.66.0-11.el8_0.12.s390x.rpm poppler-glib-0.66.0-11.el8_0.12.s390x.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.s390x.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.s390x.rpm poppler-utils-0.66.0-11.el8_0.12.s390x.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.s390x.rpm x86_64: poppler-0.66.0-11.el8_0.12.i686.rpm poppler-0.66.0-11.el8_0.12.x86_64.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm poppler-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm poppler-debugsource-0.66.0-11.el8_0.12.i686.rpm poppler-debugsource-0.66.0-11.el8_0.12.x86_64.rpm poppler-glib-0.66.0-11.el8_0.12.i686.rpm poppler-glib-0.66.0-11.el8_0.12.x86_64.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm poppler-utils-0.66.0-11.el8_0.12.x86_64.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm Red Hat CodeReady Linux Builder (v. 8): aarch64: poppler-cpp-0.66.0-11.el8_0.12.aarch64.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm poppler-cpp-devel-0.66.0-11.el8_0.12.aarch64.rpm poppler-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm poppler-debugsource-0.66.0-11.el8_0.12.aarch64.rpm poppler-devel-0.66.0-11.el8_0.12.aarch64.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm poppler-glib-devel-0.66.0-11.el8_0.12.aarch64.rpm poppler-qt5-0.66.0-11.el8_0.12.aarch64.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm poppler-qt5-devel-0.66.0-11.el8_0.12.aarch64.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.aarch64.rpm ppc64le: poppler-cpp-0.66.0-11.el8_0.12.ppc64le.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm poppler-cpp-devel-0.66.0-11.el8_0.12.ppc64le.rpm poppler-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm poppler-debugsource-0.66.0-11.el8_0.12.ppc64le.rpm poppler-devel-0.66.0-11.el8_0.12.ppc64le.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm poppler-glib-devel-0.66.0-11.el8_0.12.ppc64le.rpm poppler-qt5-0.66.0-11.el8_0.12.ppc64le.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm poppler-qt5-devel-0.66.0-11.el8_0.12.ppc64le.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.ppc64le.rpm s390x: poppler-cpp-0.66.0-11.el8_0.12.s390x.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.s390x.rpm poppler-cpp-devel-0.66.0-11.el8_0.12.s390x.rpm poppler-debuginfo-0.66.0-11.el8_0.12.s390x.rpm poppler-debugsource-0.66.0-11.el8_0.12.s390x.rpm poppler-devel-0.66.0-11.el8_0.12.s390x.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.s390x.rpm poppler-glib-devel-0.66.0-11.el8_0.12.s390x.rpm poppler-qt5-0.66.0-11.el8_0.12.s390x.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.s390x.rpm poppler-qt5-devel-0.66.0-11.el8_0.12.s390x.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.s390x.rpm x86_64: poppler-cpp-0.66.0-11.el8_0.12.i686.rpm poppler-cpp-0.66.0-11.el8_0.12.x86_64.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-cpp-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm poppler-cpp-devel-0.66.0-11.el8_0.12.i686.rpm poppler-cpp-devel-0.66.0-11.el8_0.12.x86_64.rpm poppler-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm poppler-debugsource-0.66.0-11.el8_0.12.i686.rpm poppler-debugsource-0.66.0-11.el8_0.12.x86_64.rpm poppler-devel-0.66.0-11.el8_0.12.i686.rpm poppler-devel-0.66.0-11.el8_0.12.x86_64.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-glib-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm poppler-glib-devel-0.66.0-11.el8_0.12.i686.rpm poppler-glib-devel-0.66.0-11.el8_0.12.x86_64.rpm poppler-qt5-0.66.0-11.el8_0.12.i686.rpm poppler-qt5-0.66.0-11.el8_0.12.x86_64.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-qt5-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm poppler-qt5-devel-0.66.0-11.el8_0.12.i686.rpm poppler-qt5-devel-0.66.0-11.el8_0.12.x86_64.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.i686.rpm poppler-utils-debuginfo-0.66.0-11.el8_0.12.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-18897 https://access.redhat.com/security/cve/CVE-2018-20481 https://access.redhat.com/security/cve/CVE-2018-20551 https://access.redhat.com/security/cve/CVE-2018-20650 https://access.redhat.com/security/cve/CVE-2018-20662 https://access.redhat.com/security/cve/CVE-2019-7310 https://access.redhat.com/security/cve/CVE-2019-9200 https://access.redhat.com/security/cve/CVE-2019-9631 https://access.redhat.com/security/cve/CVE-2019-9903 https://access.redhat.com/security/cve/CVE-2019-9959 https://access.redhat.com/security/cve/CVE-2019-10871 https://access.redhat.com/security/cve/CVE-2019-12293 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXXi/19zjgjWX9erEAQiPdw/+LtA/G5SgnDzFpdhpxOa9X+noX5a+2dXO Qiheg9ozVvajD+4qp2dUwq2r53dLH0tDeCt6wl0YIvUmfE3+UBPIuJG7ijD5GVg5 p+PdxeGm9NcpusPTLn3c2pkxW7XM6emrd/l+7ImmTvqaCeug8nEp5PVXuYSYajC1 gxvKxWq170qmiRBTC7ONzQy3cPWRliDZvw4ELtriuzXNveiur5+eBX1kcp5jCKhR rjQvXLVgnng62+xUX5fsBVf1DjJ0Elg8n3Uo7kbC1AhlmhuEHLD1seyYWRQYoIM3 NCfwY+wu+rxHVXnr1k85OJZfWDK91qKScm61AZin1jsNu6H5NDTmbCn9mbZWw6RN G9xm+GbRC+bdv5bqAsVRZTC1+LRXexvE3QbmQIX3iqdNOlE8dFjWChpUBdzxGppA pNBm4boBMz45UVbZT0oC1A3sZfpNpKO7LkZZsNxRKBaUvbahTNIU/eYj9g2IdKoc 7mqYKRg95TugEThs1v+ie2zEJR5aLTbHKXplhiBKwoYhTlkZ3+ke61zkFm/jm9eZ PwutkfaXhExPbt0ph9HxkxmersNNJii0AYt8c37oRBPBEvnl6yy3i79Y2ds51wdo +qTH0WHlwVpL50PMGMl7yXyw9CraIc1GDDOAHJbc+y7VbCJ5Cu3QCX802ql48i79 57WGrb+WGyE= =T3jS - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXXmPRGaOgq3Tt24GAQj1Ig//cN52r0P8/hL4vislsl5cfzPJNOQwi9Yx 6n1qYanGeoSXLYa0CwUJ3kEfaKOWIqyKYNkJBWp7p2pxmEqGc+Dv1cOX7wBHGSh1 22fkxoZ8b7b18eI8c9HR+Ggc8B3PNhOSCoCCNybLH235F9Z9fngOaCy3D/iKM/7m bhTzXFkJ6yW9l5Lf0r7f+BJkRupsyxAzfGgX2cGppB8/a2dqqkLA44yevhAS9aHU isB3MFiOo4E75t2v92wt8AXQ6HJb33q38m0X3Mr1Y/m/Bn9DY6IH5iz4M4JU5L66 2o2f/pYesqzgbxcmuSCYMKu3bXDE0wzRyF5Vklf0aD9A/sDRoaaEKZhYzhGWvbKS pa0iImjIgPj2U+pEIxOomV/9e4vpbP4+U2R3NofwCK5M4DcLotwgC9gd0U3U/l0y Dl2byg9wQb5L422SGCffKitzxUy4/GnOPvLyT7ccnV86qptXMfPlYMdRf8rXef07 23hOeI7/7NrPKgc8WWeAQUkzUH6JQPgDLj1o1FiMayGEha4QPExhi7rmXa0XnDDm Ngn7zbhgV0KOjM/78h4UXWbr9VO4blw0120LuES9iVJYNfyeVnbFDHEx2bGqdzCb 3VyN1hMc/7H998tIeBSxuwjilzrFoH/nNE4fHgqzkDw+MRVxmtaBNynnlmKQPb1y TE/10Co1fe8= =rRp/ -----END PGP SIGNATURE-----