{"id":"MGASA-2017-0360","summary":"Updated poppler packages fix security vulnerabilities","details":"In Poppler 0.59.0, a NULL Pointer Dereference exists in the\nXRef::parseEntry() function in XRef.cc via a crafted PDF document.\n(CVE-2017-14517)\n\nIn Poppler 0.59.0, memory corruption occurs in a call to\nObject::streamGetChar in Object.h after a repeating series of\nGfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and\nGfx::doShowText calls (aka a Gfx.cc infinite loop). (CVE-2017-14519)\n\nIn Poppler 0.59.0, a floating point exception occurs in\nSplash::scaleImageYuXd() in Splash.cc, which may lead to a potential\nattack when handling malicious PDF files. (CVE-2017-14520)\n","modified":"2026-04-16T06:26:20.734353230Z","published":"2017-10-05T20:37:56Z","upstream":["CVE-2017-14517","CVE-2017-14519","CVE-2017-14520"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0360.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21784"},{"type":"WEB","url":"https://usn.ubuntu.com/usn/usn-3433-1/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1494582"}],"affected":[{"package":{"name":"poppler","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/poppler?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.26.5-2.4.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0360.json"}},{"package":{"name":"poppler","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/poppler?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.52.0-3.2.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0360.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}