Source: poppler Version: 0.57.0-2 Severity: important Tags: patch upstream security Forwarded: https://bugs.freedesktop.org/show_bug.cgi?id=102701
Hi, the following vulnerability was published for poppler. CVE-2017-14519[0]: | In Poppler 0.59.0, memory corruption occurs in a call to | Object::streamGetChar in Object.h after a repeating series of | Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and | Gfx::doShowText calls (aka a Gfx.cc infinite loop). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-14519 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519 [1] https://bugs.freedesktop.org/show_bug.cgi?id=102701 [2] https://cgit.freedesktop.org/poppler/poppler/commit/?id=aaf5327649e8f7371c9d3270e7813c43ddfd47ee Please adjust the affected versions in the BTS as needed. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team