CESA-2009:0480 -- centos 5 i386 popplerID: oval:org.secpod.oval:def:202039 | Date: (C)2012-01-31 (M)2024-01-02 |
Class: PATCH | Family: unix |
Poppler is a Portable Document Format rendering library, used by applications such as Evince. Multiple integer overflow flaws were found in poppler. An attacker could create a malicious PDF file that would cause applications that use poppler to crash or, potentially, execute arbitrary code when opened. Multiple buffer overflow flaws were found in poppler"s JBIG2 decoder. An attacker could create a malicious PDF file that would cause applications that use poppler to crash or, potentially, execute arbitrary code when opened. Multiple flaws were found in poppler"s JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause applications that use poppler to crash or, potentially, execute arbitrary code when opened. Multiple input validation flaws were found in poppler"s JBIG2 decoder. An attacker could create a malicious PDF file that would cause applications that use poppler to crash or, potentially, execute arbitrary code when opened. Multiple denial of service flaws were found in poppler"s JBIG2 decoder. An attacker could create a malicious PDF file that would cause applications that use poppler to crash when opened. Red Hat would like to thank Braden Thomas and Drew Yao of the Apple Product Security team, and Will Dormann of the CERT/CC for responsibly reporting these flaws. Users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.