Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 480366 (CVE-2012-2142) - app-text/poppler: Insufficient sanitization of escape sequences in the error messages (CVE-2012-2142)
Summary: app-text/poppler: Insufficient sanitization of escape sequences in the error ...
Status: RESOLVED FIXED
Alias: CVE-2012-2142
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: A2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-08-09 12:52 UTC by Agostino Sarubbo
Modified: 2013-10-06 16:08 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-08-09 12:52:11 UTC
From ${URL} :


  An insufficient escape sequences sanitization flaw was found in the way xpdf, a PDF file viewer 
for the X window system, and poppler, a PDF rendering library, performed sanitization of certain 
characters to be displayed in the error messages, which arose during presentation of certain PDF 
files. A remote attacker could use this flaw to modify a window's title, or, possibly execute 
arbitrary commands or overwrite files, via a specially-crafted PDF file containing an escape 
sequence for a terminal emulator if local, unsuspecting user opened such crafted PDF file in xpdf 
or in an application linked against poppler library (for example evince).

References: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2142

Poppler upstream patch:
  http://cgit.freedesktop.org/poppler/poppler/commit/?id=71bad47ed6a36d825b0d08992c8db56845c71e40



@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Andreas K. Hüttel archtester gentoo-dev 2013-08-11 18:01:45 UTC
That commmit went in long before poppler-0.22, and we do not have any affected versions in the tree at least since 11 Apr 2013.

Robo-adding sec bugs without any version reference does not really make maintainers enthusiastic, mind you.
Comment 2 Michael Palimaka (kensington) gentoo-dev 2013-08-14 12:51:32 UTC
Nothing else to do for KDE team here.
Comment 3 Chris Reffett (RETIRED) gentoo-dev Security 2013-08-15 00:01:01 UTC
Filing GLSA.
Comment 4 Andreas K. Hüttel archtester gentoo-dev 2013-08-24 12:16:40 UTC
Nothing to do for printing team here.
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2013-10-06 16:08:46 UTC
This issue was resolved and addressed in
 GLSA 201310-03 at http://security.gentoo.org/glsa/glsa-201310-03.xml
by GLSA coordinator Sean Amoss (ackle).