(https://nvd.nist.gov/vuln/detail/CVE-2019-9545): An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readTextRegion() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JBIG2Bitmap::clearToZero. Reference: https://gitlab.freedesktop.org/poppler/poppler/issues/731 (https://nvd.nist.gov/vuln/detail/CVE-2019-9543): An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readGenericBitmap() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfseparate binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JArithmeticDecoder::decodeBit. Reference: https://gitlab.freedesktop.org/poppler/poppler/issues/730 Gentoo Security Padawan (domhnall)
poppler is a common lib, I'd set it to A
CVE-2019-9545 (https://nvd.nist.gov/vuln/detail/CVE-2019-9545): An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readTextRegion() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JBIG2Bitmap::clearToZero. CVE-2019-9543 (https://nvd.nist.gov/vuln/detail/CVE-2019-9543): An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readGenericBitmap() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfseparate binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JArithmeticDecoder::decodeBit.
"The latest stable release is poppler-0.84.0.tar.xz, released on December 28, 2019: Release 0.84.0: core: * Fix crash when converting from Unicode to ASCII-7 * Splash::scaleImageYdXu: Protect against crash if srcWidth is too big * JBIG2Stream: fix potential crash in malformed documents * JBIG2Stream: fix leak in reset() if called several times * Internal code improvements utils: * pdfimages: Add error message if first page is larger then number of pages. * pdfinfo: Improved paper size recognition * pdfsig: Fix exit code when dumping signatures * pdftocairo: Error out when even/odd selects 0 pages * pdftohtml: Fix memory leak * pdftoppm: Add an option to scale before rotate * pdftoppm: Add -hide-annotations option * pdftoppm: Error out when even/odd selects 0 pages * pdftops: Improve -optimizecolorspace qt5: * Code cleanups glib: * Fix compiler warnings "
Is the release related to this security bug?
For anyone wondering, if these CVE are still relevant in 2022, the upstream issues are open and without any upstream reaction: CVE-2019-9543: https://gitlab.freedesktop.org/poppler/poppler/-/issues/730 CVE-2019-9545: https://gitlab.freedesktop.org/poppler/poppler/-/issues/731
Yes.
(In reply to Niklāvs Koļesņikovs from comment #5) > For anyone wondering, if these CVE are still relevant in 2022, the upstream > issues are open and without any upstream reaction: > > CVE-2019-9543: https://gitlab.freedesktop.org/poppler/poppler/-/issues/730 > > CVE-2019-9545: https://gitlab.freedesktop.org/poppler/poppler/-/issues/731 One year ago, nothing changed at the upstream reports. Is this still relevant for latest releases?
(In reply to jospezial from comment #7) > (In reply to Niklāvs Koļesņikovs from comment #5) > > For anyone wondering, if these CVE are still relevant in 2022, the upstream > > issues are open and without any upstream reaction: > > > > CVE-2019-9543: https://gitlab.freedesktop.org/poppler/poppler/-/issues/730 > > > > CVE-2019-9545: https://gitlab.freedesktop.org/poppler/poppler/-/issues/731 > > One year ago, nothing changed at the upstream reports. > Is this still relevant for latest releases? Until the upstream bugs are closed, I assume yes. You can try the reproducers given in the bug if you want, at your own risk.