Debian Bug report logs -
#863016
poppler: CVE-2017-9083
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Loic Minier <lool@dooz.org>
:
Bug#863016
; Package src:poppler
.
(Sat, 20 May 2017 08:33:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Loic Minier <lool@dooz.org>
.
(Sat, 20 May 2017 08:33:05 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: poppler
Version: 0.26.5-2
Severity: important
Tags: upstream security
Forwarded: https://bugs.freedesktop.org/show_bug.cgi?id=101084
Hi,
the following vulnerability was published for poppler.
CVE-2017-9083[0]:
| poppler 0.54.0, as used in Evince and other products, has a NULL
| pointer dereference in the JPXStream::readUByte function in
| JPXStream.cc. For example, the perf_test utility will crash
| (segmentation fault) when parsing an invalid PDF file.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-9083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9083
[1] https://bugs.freedesktop.org/show_bug.cgi?id=101084
Regards,
Salvatore
Information forwarded
to debian-bugs-dist@lists.debian.org, Loic Minier <lool@dooz.org>
:
Bug#863016
; Package src:poppler
.
(Sat, 20 May 2017 12:45:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Jason Crain <jason@inspiresomeone.us>
:
Extra info received and forwarded to list. Copy sent to Loic Minier <lool@dooz.org>
.
(Sat, 20 May 2017 12:45:03 GMT) (full text, mbox, link).
Message #10 received at 863016@bugs.debian.org (full text, mbox, reply):
On Sat, May 20, 2017 at 10:30:17AM +0200, Salvatore Bonaccorso wrote:
> the following vulnerability was published for poppler.
>
> CVE-2017-9083[0]:
> | poppler 0.54.0, as used in Evince and other products, has a NULL
> | pointer dereference in the JPXStream::readUByte function in
> | JPXStream.cc. For example, the perf_test utility will crash
> | (segmentation fault) when parsing an invalid PDF file.
Does this apply to Debian's poppler? I think uses openjpeg instead of
the internal JPX decoder.
There's a discussion on the poppler mailing list about making it more
explicit that the internal decoders are unmaintained:
https://lists.freedesktop.org/archives/poppler/2017-May/012230.html
Information forwarded
to debian-bugs-dist@lists.debian.org, Loic Minier <lool@dooz.org>
:
Bug#863016
; Package src:poppler
.
(Sat, 20 May 2017 13:24:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to Loic Minier <lool@dooz.org>
.
(Sat, 20 May 2017 13:24:03 GMT) (full text, mbox, link).
Message #15 received at 863016@bugs.debian.org (full text, mbox, reply):
Control: severity -1 minor
Hi Jason,
On Sat, May 20, 2017 at 07:39:02AM -0500, Jason Crain wrote:
> On Sat, May 20, 2017 at 10:30:17AM +0200, Salvatore Bonaccorso wrote:
> > the following vulnerability was published for poppler.
> >
> > CVE-2017-9083[0]:
> > | poppler 0.54.0, as used in Evince and other products, has a NULL
> > | pointer dereference in the JPXStream::readUByte function in
> > | JPXStream.cc. For example, the perf_test utility will crash
> > | (segmentation fault) when parsing an invalid PDF file.
>
> Does this apply to Debian's poppler? I think uses openjpeg instead of
> the internal JPX decoder.
I think you are right. While checking, I looked at the source only,
not realizing that it's not relevant for the built binary packages due
to your note.
I changed the severity, and in the security-tracker it is now marked
as 'unimportant', which is the tag used when a source is affected, but
the issue does not affect the built binary packages.
Thanks a lot for checking the bugreport!
Salvatore
Severity set to 'minor' from 'important'
Request was from Salvatore Bonaccorso <carnil@debian.org>
to 863016-submit@bugs.debian.org
.
(Sat, 20 May 2017 13:24:03 GMT) (full text, mbox, link).
Added tag(s) fixed-upstream.
Request was from debian-bts-link@lists.debian.org
to control@bugs.debian.org
.
(Thu, 19 Apr 2018 17:09:03 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 16:36:00 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.