-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.4129
                        Security update for poppler
                               21 July 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           poppler
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-27337 CVE-2019-7310 CVE-2018-21009
                   CVE-2018-20650 CVE-2018-20481 CVE-2018-19149
                   CVE-2018-19060 CVE-2018-19059 CVE-2018-19058
                   CVE-2018-18897 CVE-2018-16646 CVE-2018-13988
                   CVE-2017-18267  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20232906-1

Comment: CVSS (Max):  5.3 CVE-2019-7310 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for poppler

Announcement ID:  SUSE-SU-2023:2906-1
     Rating:      moderate
                    o #1092945
                    o #1102531
                    o #1107597
                    o #1114966
                    o #1115185
                    o #1115186
   References:      o #1115187
                    o #1115626
                    o #1120939
                    o #1124150
                    o #1149635
                    o #1199272

                    o CVE-2017-18267
                    o CVE-2018-13988
                    o CVE-2018-16646
                    o CVE-2018-18897
                    o CVE-2018-19058
                    o CVE-2018-19059
Cross-References:   o CVE-2018-19060
                    o CVE-2018-19149
                    o CVE-2018-20481
                    o CVE-2018-20650
                    o CVE-2018-21009
                    o CVE-2019-7310
                    o CVE-2022-27337

                    o CVE-2017-18267 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:N/I:N/A:L
                    o CVE-2017-18267 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-13988 ( SUSE ): 5.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:L/I:L/A:L
                    o CVE-2018-13988 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-16646 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:N/I:N/A:L
                    o CVE-2018-16646 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-18897 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:N/I:N/A:L
                    o CVE-2018-18897 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-18897 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-19058 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:N/I:N/A:L
                    o CVE-2018-19058 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-19058 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-19059 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:N/I:N/A:L
                    o CVE-2018-19059 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-19060 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:N/I:N/A:L
  CVSS scores:      o CVE-2018-19060 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-19149 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:N/I:N/A:L
                    o CVE-2018-19149 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-20481 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:N/I:N/A:L
                    o CVE-2018-20481 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-20650 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:N/I:N/A:L
                    o CVE-2018-20650 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-20650 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2018-21009 ( SUSE ): 4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N
                      /S:U/C:N/I:N/A:L
                    o CVE-2018-21009 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:H/I:H/A:H
                    o CVE-2019-7310 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/
                      S:U/C:L/I:L/A:L
                    o CVE-2019-7310 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/
                      S:U/C:H/I:H/A:H
                    o CVE-2019-7310 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:H/I:H/A:H
                    o CVE-2022-27337 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N
                      /S:U/C:N/I:N/A:L
                    o CVE-2022-27337 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H

                    o SUSE Linux Enterprise High Performance Computing 12 SP5
    Affected        o SUSE Linux Enterprise Server 12 SP5
    Products:       o SUSE Linux Enterprise Server for SAP Applications 12 SP5
                    o SUSE Linux Enterprise Software Development Kit 12 SP5

An update that solves 13 vulnerabilities can now be installed.

Description:

This update for poppler fixes the following issues:

  o CVE-2022-27337: Fixed a logic error in the Hints::Hints function which can
    cause denial of service (bsc#1199272).
  o CVE-2018-21009: Fixed integer overflow in Parser:makeStream in Parser.cc
    (bsc#1149635).
  o CVE-2018-20481: Fixed memory leak in GfxColorSpace:setDisplayProfile in
    GfxState.cc (bsc#1114966).
  o CVE-2019-7310: Fixed a heap-based buffer over-read allows remote attackers
    to cause DOS via a special crafted PDF (bsc#1124150).
  o CVE-2018-13988: Fixed buffer overflow in pdfunite (bsc#1102531).
  o CVE-2018-16646: Fixed infinite recursion in poppler/
    Parser.cc:Parser::getObj() function (bsc#1107597).
  o CVE-2018-19058: Fixed reachable abort in Object.h leading to denial of
    service (bsc#1115187).
  o CVE-2018-19059: Fixed out-of-bounds read in EmbFile:save2 in FileSpec.cc
    leading to denial of service (bsc#1115186).
  o CVE-2018-19060: Fixed NULL pointer dereference in goo/GooString.h leading
    to denial of service (bsc#1115185).
  o CVE-2018-19149: Fixed NULL pointer dereference in _poppler_attachment_new
    when called from poppler_annot_file_attachment_get_attachment (bsc#
    1115626).
  o CVE-2017-18267: Fixed denial of service (infinite recursion) via a crafted
    PDF file (bsc#1092945).
  o CVE-2018-20650: Fixed issue where a reachable Object in dictLookup
    assertion allows attackers to cause DOS (bsc#1120939).

Patch Instructions:

To install this SUSE Moderate update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Software Development Kit 12 SP5
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2023-2906=1

Package List:

  o SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le
    s390x x86_64)
       libpoppler44-debuginfo-0.24.4-14.26.1
       libpoppler44-0.24.4-14.26.1

References:

  o https://www.suse.com/security/cve/CVE-2017-18267.html
  o https://www.suse.com/security/cve/CVE-2018-13988.html
  o https://www.suse.com/security/cve/CVE-2018-16646.html
  o https://www.suse.com/security/cve/CVE-2018-18897.html
  o https://www.suse.com/security/cve/CVE-2018-19058.html
  o https://www.suse.com/security/cve/CVE-2018-19059.html
  o https://www.suse.com/security/cve/CVE-2018-19060.html
  o https://www.suse.com/security/cve/CVE-2018-19149.html
  o https://www.suse.com/security/cve/CVE-2018-20481.html
  o https://www.suse.com/security/cve/CVE-2018-20650.html
  o https://www.suse.com/security/cve/CVE-2018-21009.html
  o https://www.suse.com/security/cve/CVE-2019-7310.html
  o https://www.suse.com/security/cve/CVE-2022-27337.html
  o https://bugzilla.suse.com/show_bug.cgiid=1092945
  o https://bugzilla.suse.com/show_bug.cgiid=1102531
  o https://bugzilla.suse.com/show_bug.cgiid=1107597
  o https://bugzilla.suse.com/show_bug.cgiid=1114966
  o https://bugzilla.suse.com/show_bug.cgiid=1115185
  o https://bugzilla.suse.com/show_bug.cgiid=1115186
  o https://bugzilla.suse.com/show_bug.cgiid=1115187
  o https://bugzilla.suse.com/show_bug.cgiid=1115626
  o https://bugzilla.suse.com/show_bug.cgiid=1120939
  o https://bugzilla.suse.com/show_bug.cgiid=1124150
  o https://bugzilla.suse.com/show_bug.cgiid=1149635
  o https://bugzilla.suse.com/show_bug.cgiid=1199272

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=3bEd
-----END PGP SIGNATURE-----