Summary: | app-text/poppler: Heap-buffer overflow (CVE-2020-35702) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | CC: | office, printing, reavertm |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011 | ||
Whiteboard: | A3 [upstream/ebuild] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
2020-12-25 01:57:17 UTC
Consider applying: https://gitlab.freedesktop.org/poppler/poppler/-/commit/ae614bf8ab42c9d0c7ac57ecdfdcbcfc4ff6c639 The changed code was only introduced 1 week ago (is not in any release). (In reply to Andreas Sturmlechner from comment #2) > The changed code was only introduced 1 week ago (is not in any release). Oh, okay, the CVE text was wrong. Sometimes I've learned to doubt it, clearly not right here. The text was later updated, FWIW: "** DISPUTED ** DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects." |