Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 845027 (CVE-2022-30524, CVE-2022-30775) - app-text/xpdf: multiple vulnerabilities
Summary: app-text/xpdf: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2022-30524, CVE-2022-30775
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://forum.xpdfreader.com/viewtopi...
Whiteboard: B3 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-05-16 16:39 UTC by John Helmert III
Modified: 2022-05-16 17:00 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-16 16:39:56 UTC
CVE-2022-30524:

There is an invalid memory access in the TextLine class in TextOutputDev.cc in Xpdf 4.0.4 because the text extractor mishandles characters at large y coordinates. It can be triggered by (for example) sending a crafted pdf file to the pdftotext binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-16 17:00:32 UTC
CVE-2022-30775 (https://forum.xpdfreader.com/viewtopic.php?f=3&t=42264):

xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered by (for example) sending a crafted PDF document to the pdftoppm binary. It is most easily reproduced with the DCMAKE_CXX_COMPILER=afl-clang-fast++ option.