Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 631292 (CVE-2017-14518, CVE-2017-14519, CVE-2017-14520)

Summary: <app-text/poppler-0.57.0-r1: in Poppler 0.59.0, Multiple Vulnerabilities
Product: Gentoo Security Reporter: D'juan McDonald (domhnall) <flopwiki>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: printing, reavertm
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugs.freedesktop.org/show_bug.cgi?id=102{688,701,719}
See Also: https://bugs.freedesktop.org/show_bug.cgi?id=102688
https://bugs.freedesktop.org/show_bug.cgi?id=102701
https://bugs.freedesktop.org/show_bug.cgi?id=102719
Whiteboard: B3 [noglsa cve]
Package list:
Runtime testing required: ---

Description D'juan McDonald (domhnall) 2017-09-18 01:44:16 UTC
from {URL}:

CVE-2017-14518:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14518
In Poppler 0.59.0, a floating point exception exists in the isImageInterpolationRequired() function in Splash.cc via a crafted PDF document.

CVE-2017-14519:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14519
In Poppler 0.59.0, memory corruption occurs in a call to Object::streamGetChar in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and Gfx::doShowText calls (aka a Gfx.cc infinite loop).

CVE-2017-14520:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14520
In Poppler 0.59.0, a floating point exception occurs in Splash::scaleImageYuXd() in Splash.cc, which may lead to a potential attack when handling malicious PDF files.


@maintainer(s), if stabilization is needed please call for it, thank you.

Daj Uan (jmbailey)
Gentoo Security Padawan
Comment 2 Larry the Git Cow gentoo-dev 2017-11-24 23:07:56 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f3537c5c4ed62c425068d9a3d3f226fe53cbf9ba

commit f3537c5c4ed62c425068d9a3d3f226fe53cbf9ba
Author:     Andreas Sturmlechner <asturm@gentoo.org>
AuthorDate: 2017-11-24 21:29:00 +0000
Commit:     Andreas Sturmlechner <asturm@gentoo.org>
CommitDate: 2017-11-24 23:06:22 +0000

    app-text/poppler: Fix CVE-2017-145{18,19,20}
    
    Bug: https://bugs.gentoo.org/631292
    Package-Manager: Portage-2.3.16, Repoman-2.3.6

 .../files/poppler-0.57.0-CVE-2017-14518.patch      |  27 ++++++
 .../files/poppler-0.57.0-CVE-2017-14519.patch      | 100 +++++++++++++++++++++
 .../files/poppler-0.57.0-CVE-2017-14520.patch      |  24 +++++
 app-text/poppler/poppler-0.57.0-r1.ebuild          |   3 +
 4 files changed, 154 insertions(+)}
Comment 3 Aaron Bauman (RETIRED) gentoo-dev 2018-01-15 23:18:55 UTC
GLSA Vote: No

Tree is clean.