{"affected":[{"ecosystem_specific":{"binaries":[{"libpoppler-cpp0":"0.43.0-16.19.3","libpoppler-devel":"0.43.0-16.19.3","libpoppler-glib-devel":"0.43.0-16.19.3","libpoppler-qt4-devel":"0.43.0-16.19.3","typelib-1_0-Poppler-0_18":"0.43.0-16.19.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"poppler","purl":"pkg:rpm/suse/poppler&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.43.0-16.19.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpoppler-cpp0":"0.43.0-16.19.3","libpoppler-devel":"0.43.0-16.19.3","libpoppler-glib-devel":"0.43.0-16.19.3","libpoppler-qt4-devel":"0.43.0-16.19.3","typelib-1_0-Poppler-0_18":"0.43.0-16.19.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"poppler-qt","purl":"pkg:rpm/suse/poppler-qt&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.43.0-16.19.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpoppler-glib8":"0.43.0-16.19.3","libpoppler-qt4-4":"0.43.0-16.19.3","libpoppler60":"0.43.0-16.19.3","poppler-tools":"0.43.0-16.19.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"poppler","purl":"pkg:rpm/suse/poppler&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.43.0-16.19.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpoppler-glib8":"0.43.0-16.19.3","libpoppler-qt4-4":"0.43.0-16.19.3","libpoppler60":"0.43.0-16.19.3","poppler-tools":"0.43.0-16.19.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"poppler-qt","purl":"pkg:rpm/suse/poppler-qt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.43.0-16.19.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpoppler-glib8":"0.43.0-16.19.3","libpoppler-qt4-4":"0.43.0-16.19.3","libpoppler60":"0.43.0-16.19.3","poppler-tools":"0.43.0-16.19.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"poppler","purl":"pkg:rpm/suse/poppler&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.43.0-16.19.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpoppler-glib8":"0.43.0-16.19.3","libpoppler-qt4-4":"0.43.0-16.19.3","libpoppler60":"0.43.0-16.19.3","poppler-tools":"0.43.0-16.19.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"poppler-qt","purl":"pkg:rpm/suse/poppler-qt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.43.0-16.19.3"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for poppler fixes the following issues:\n\n- CVE-2020-27778: Fixed a buffer overflow in pdftohtml (bsc#1179163).\n- CVE-2019-14494: Fixed a divide-by-zero error in pdftoppm (bsc#1143950).\n- CVE-2019-9959: Fixed an integer overflow in pdftocairo (bsc#1142465).\n- CVE-2019-10871: Fixed an invalid memory access in pdftops (bsc#1131696).\n- CVE-2019-10872: Fixed an invalid memory access in pdftoppm (bsc#1131722).\n- CVE-2019-9903: Fixed a buffer overflow in pdfunite (bsc#1130229).\n- CVE-2019-7310: Fixed an application crash in pdftocairo (bsc#1124150).\n- CVE-2019-9631: Fixed an invalid memory access in pdftocairo (bsc#1129202).\n","id":"SUSE-SU-2022:1723-1","modified":"2022-05-18T14:52:59Z","published":"2022-05-18T14:52:59Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20221723-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1124150"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1130229"},{"type":"REPORT","url":"https://bugzilla.suse.com/1131696"},{"type":"REPORT","url":"https://bugzilla.suse.com/1131722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-10871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-10872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-14494"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-7310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-9631"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-9903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-9959"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-27778"}],"related":["CVE-2019-10871","CVE-2019-10872","CVE-2019-14494","CVE-2019-7310","CVE-2019-9631","CVE-2019-9903","CVE-2019-9959","CVE-2020-27778"],"summary":"Security update for poppler","upstream":["CVE-2019-10871","CVE-2019-10872","CVE-2019-14494","CVE-2019-7310","CVE-2019-9631","CVE-2019-9903","CVE-2019-9959","CVE-2020-27778"]}