{"id":"MGASA-2017-0378","summary":"Updated poppler packages fix security vulnerabilities","details":"In Poppler 0.59.0, a floating point exception exists in the\nisImageInterpolationRequired() function in Splash.cc via a crafted PDF\ndocument. (CVE-2017-14518)\n\nIn Poppler 0.59.0, a floating point exception occurs in the ImageStream\nclass in Stream.cc, which may lead to a potential attack when handling\nmalicious PDF files. (CVE-2017-14617)\n\nIn Poppler 0.59.0, a NULL Pointer Dereference exists in\nAnnotRichMedia::Content::Content in Annot.cc via a crafted PDF document.\n(CVE-2017-14926)\n\nIn Poppler 0.59.0, a NULL Pointer Dereference exists in\nAnnotRichMedia::Configuration::Configuration in Annot.cc via a crafted\nPDF document. (CVE-2017-14928)\n\nIn Poppler 0.59.0, memory corruption occurs in a call to\nObject::dictLookup() in Object.h after a repeating series of\nGfx::display, Gfx::go, Gfx::execOp, Gfx::opFill, Gfx::doPatternFill,\nGfx::doTilingPatternFill and Gfx::drawForm calls (aka a Gfx.cc infinite\nloop), a different vulnerability than CVE-2017-14519. (CVE-2017-14929)\n\nThe FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler\n0.59.0 has a NULL pointer dereference vulnerability because a data\nstructure is not initialized, which allows an attacker to launch a\ndenial of service attack. (CVE-2017-14975)\n\nThe FoFiTrueType::getCFFBlock function in FoFiTrueType.cc in Poppler\n0.59.0 has a NULL pointer dereference vulnerability due to lack of\nvalidation of a table pointer, which allows an attacker to launch a\ndenial of service attack. (CVE-2017-14977)\n","modified":"2026-04-16T06:24:44.593997572Z","published":"2017-10-19T18:14:02Z","upstream":["CVE-2017-14518","CVE-2017-14617","CVE-2017-14926","CVE-2017-14928","CVE-2017-14929","CVE-2017-14975","CVE-2017-14977"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0378.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21825"},{"type":"WEB","url":"https://usn.ubuntu.com/usn/usn-3440-1/"}],"affected":[{"package":{"name":"poppler","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/poppler?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.26.5-2.5.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0378.json"}},{"package":{"name":"poppler","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/poppler?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.52.0-3.3.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0378.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}