[arch-security] [ASA-201706-33] poppler: arbitrary code execution
santiago at archlinux.org
Mon Jun 26 17:04:26 UTC 2017
Arch Linux Security Advisory ASA-201706-33
Date : 2017-06-26
CVE-ID : CVE-2017-9775 CVE-2017-9776
Package : poppler
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-326
The package poppler before version 0.56.0-1 is vulnerable to arbitrary
Upgrade to 0.56.0-1.
# pacman -Syu "poppler>=0.56.0-1"
The problems have been fixed upstream in version 0.56.0.
- CVE-2017-9775 (arbitrary code execution)
A stack buffer overflow in has been found in GfxState.cc's module of
poppler. Due to some restrictions in the lines after the bug, an
attacker can't control the values written in the stack so it unlikely
this could lead to a code execution.
- CVE-2017-9776 (arbitrary code execution)
Integer overflow leading to heap overflow in JBIG2Stream.cc.
An attacker might be able to execute arbitrary code on the affected
host by tricking the user into opening a crafted PDF document.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: not available
More information about the arch-security