ASA-201706-33 generated external raw

[ASA-201706-33] poppler: arbitrary code execution
Arch Linux Security Advisory ASA-201706-33 ========================================== Severity: High Date : 2017-06-26 CVE-ID : CVE-2017-9775 CVE-2017-9776 Package : poppler Type : arbitrary code execution Remote : Yes Link : Summary ======= The package poppler before version 0.56.0-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 0.56.0-1. # pacman -Syu "poppler>=0.56.0-1" The problems have been fixed upstream in version 0.56.0. Workaround ========== None. Description =========== - CVE-2017-9775 (arbitrary code execution) A stack buffer overflow in has been found in's module of poppler. Due to some restrictions in the lines after the bug, an attacker can't control the values written in the stack so it unlikely this could lead to a code execution. - CVE-2017-9776 (arbitrary code execution) Integer overflow leading to heap overflow in Impact ====== An attacker might be able to execute arbitrary code on the affected host by tricking the user into opening a crafted PDF document. References ==========