The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Poppler: denial of service via SplashOutputDev-tilingPatternFill

Synthesis of the vulnerability 

An attacker can trigger a fatal error via SplashOutputDev::tilingPatternFill() of Poppler, in order to trigger a denial of service.
Impacted products: Fedora, Solaris, Ubuntu.
Severity of this bulletin: 2/4.
Creation date: 13/08/2019.
Références of this threat: bulletinoct2019, CVE-2019-14494, FEDORA-2020-24ded2cd52, FEDORA-2020-b8b7a4a0e5, USN-4091-1, VIGILANCE-VUL-30027.

Description of the vulnerability 

An attacker can trigger a fatal error via SplashOutputDev::tilingPatternFill() of Poppler, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability announce impacts software or systems such as Fedora, Solaris, Ubuntu.

Our Vigil@nce team determined that the severity of this cybersecurity threat is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer threat bulletin.

Solutions for this threat 

Fedora: new poppler packages.
New packages are available:
  Fedora 30: poppler 0.73.0-16.fc30
  Fedora 31: poppler 0.73.0-16.fc31

Oracle Solaris: patch for third party software of October 2019 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Ubuntu: new poppler packages.
New packages are available:
  Ubuntu 19.04: poppler 0.74.0-0ubuntu1.3
  Ubuntu 18.04 LTS: poppler 0.62.0-2ubuntu2.10
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computers vulnerabilities patches. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.