Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 761544 (CVE-2020-35702)

Summary: app-text/poppler: Heap-buffer overflow (CVE-2020-35702)
Product: Gentoo Security Reporter: Sam James <sam>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: normal CC: office, printing, reavertm
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011
Whiteboard: A3 [upstream/ebuild]
Package list:
Runtime testing required: ---

Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-12-25 01:57:17 UTC
Description:
"DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document."
Comment 2 Andreas Sturmlechner gentoo-dev 2020-12-25 14:16:56 UTC
The changed code was only introduced 1 week ago (is not in any release).
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-12-26 19:47:43 UTC
(In reply to Andreas Sturmlechner from comment #2)
> The changed code was only introduced 1 week ago (is not in any release).

Oh, okay, the CVE text was wrong. Sometimes I've learned to doubt it, clearly not right here.
Comment 4 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-01-06 00:47:58 UTC
The text was later updated, FWIW:
"** DISPUTED ** DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects."