Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 631292 (CVE-2017-14518, CVE-2017-14519, CVE-2017-14520) - <app-text/poppler-0.57.0-r1: in Poppler 0.59.0, Multiple Vulnerabilities
Summary: <app-text/poppler-0.57.0-r1: in Poppler 0.59.0, Multiple Vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2017-14518, CVE-2017-14519, CVE-2017-14520
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugs.freedesktop.org/show_bug...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-09-18 01:44 UTC by D'juan McDonald (domhnall)
Modified: 2018-01-15 23:18 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2017-09-18 01:44:16 UTC
from {URL}:

CVE-2017-14518:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14518
In Poppler 0.59.0, a floating point exception exists in the isImageInterpolationRequired() function in Splash.cc via a crafted PDF document.

CVE-2017-14519:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14519
In Poppler 0.59.0, memory corruption occurs in a call to Object::streamGetChar in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and Gfx::doShowText calls (aka a Gfx.cc infinite loop).

CVE-2017-14520:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14520
In Poppler 0.59.0, a floating point exception occurs in Splash::scaleImageYuXd() in Splash.cc, which may lead to a potential attack when handling malicious PDF files.


@maintainer(s), if stabilization is needed please call for it, thank you.

Daj Uan (jmbailey)
Gentoo Security Padawan
Comment 2 Larry the Git Cow gentoo-dev 2017-11-24 23:07:56 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f3537c5c4ed62c425068d9a3d3f226fe53cbf9ba

commit f3537c5c4ed62c425068d9a3d3f226fe53cbf9ba
Author:     Andreas Sturmlechner <asturm@gentoo.org>
AuthorDate: 2017-11-24 21:29:00 +0000
Commit:     Andreas Sturmlechner <asturm@gentoo.org>
CommitDate: 2017-11-24 23:06:22 +0000

    app-text/poppler: Fix CVE-2017-145{18,19,20}
    
    Bug: https://bugs.gentoo.org/631292
    Package-Manager: Portage-2.3.16, Repoman-2.3.6

 .../files/poppler-0.57.0-CVE-2017-14518.patch      |  27 ++++++
 .../files/poppler-0.57.0-CVE-2017-14519.patch      | 100 +++++++++++++++++++++
 .../files/poppler-0.57.0-CVE-2017-14520.patch      |  24 +++++
 app-text/poppler/poppler-0.57.0-r1.ebuild          |   3 +
 4 files changed, 154 insertions(+)}
Comment 3 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-01-15 23:18:55 UTC
GLSA Vote: No

Tree is clean.