poppler: CVE-2017-9083

Related Vulnerabilities: CVE-2017-9083  

Debian Bug report logs - #863016
poppler: CVE-2017-9083

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sat, 20 May 2017 08:33:02 UTC

Severity: minor

Tags: fixed-upstream, security, upstream

Found in version poppler/0.26.5-2

Forwarded to https://bugs.freedesktop.org/show_bug.cgi?id=101084

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Loic Minier <lool@dooz.org>:
Bug#863016; Package src:poppler. (Sat, 20 May 2017 08:33:05 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Loic Minier <lool@dooz.org>. (Sat, 20 May 2017 08:33:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: poppler: CVE-2017-9083
Date: Sat, 20 May 2017 10:30:17 +0200
Source: poppler
Version: 0.26.5-2
Severity: important
Tags: upstream security
Forwarded: https://bugs.freedesktop.org/show_bug.cgi?id=101084

Hi,

the following vulnerability was published for poppler.

CVE-2017-9083[0]:
| poppler 0.54.0, as used in Evince and other products, has a NULL
| pointer dereference in the JPXStream::readUByte function in
| JPXStream.cc. For example, the perf_test utility will crash
| (segmentation fault) when parsing an invalid PDF file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-9083
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9083
[1] https://bugs.freedesktop.org/show_bug.cgi?id=101084

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Loic Minier <lool@dooz.org>:
Bug#863016; Package src:poppler. (Sat, 20 May 2017 12:45:03 GMT) (full text, mbox, link).


Acknowledgement sent to Jason Crain <jason@inspiresomeone.us>:
Extra info received and forwarded to list. Copy sent to Loic Minier <lool@dooz.org>. (Sat, 20 May 2017 12:45:03 GMT) (full text, mbox, link).


Message #10 received at 863016@bugs.debian.org (full text, mbox, reply):

From: Jason Crain <jason@inspiresomeone.us>
To: Salvatore Bonaccorso <carnil@debian.org>, 863016@bugs.debian.org
Subject: Re: Bug#863016: poppler: CVE-2017-9083
Date: Sat, 20 May 2017 07:39:02 -0500
On Sat, May 20, 2017 at 10:30:17AM +0200, Salvatore Bonaccorso wrote:
> the following vulnerability was published for poppler.
> 
> CVE-2017-9083[0]:
> | poppler 0.54.0, as used in Evince and other products, has a NULL
> | pointer dereference in the JPXStream::readUByte function in
> | JPXStream.cc. For example, the perf_test utility will crash
> | (segmentation fault) when parsing an invalid PDF file.

Does this apply to Debian's poppler?  I think uses openjpeg instead of
the internal JPX decoder.

There's a discussion on the poppler mailing list about making it more
explicit that the internal decoders are unmaintained:
https://lists.freedesktop.org/archives/poppler/2017-May/012230.html



Information forwarded to debian-bugs-dist@lists.debian.org, Loic Minier <lool@dooz.org>:
Bug#863016; Package src:poppler. (Sat, 20 May 2017 13:24:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Loic Minier <lool@dooz.org>. (Sat, 20 May 2017 13:24:03 GMT) (full text, mbox, link).


Message #15 received at 863016@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Jason Crain <jason@inspiresomeone.us>, 863016@bugs.debian.org
Subject: Re: Bug#863016: poppler: CVE-2017-9083
Date: Sat, 20 May 2017 15:20:41 +0200
Control: severity -1 minor

Hi Jason,

On Sat, May 20, 2017 at 07:39:02AM -0500, Jason Crain wrote:
> On Sat, May 20, 2017 at 10:30:17AM +0200, Salvatore Bonaccorso wrote:
> > the following vulnerability was published for poppler.
> > 
> > CVE-2017-9083[0]:
> > | poppler 0.54.0, as used in Evince and other products, has a NULL
> > | pointer dereference in the JPXStream::readUByte function in
> > | JPXStream.cc. For example, the perf_test utility will crash
> > | (segmentation fault) when parsing an invalid PDF file.
> 
> Does this apply to Debian's poppler?  I think uses openjpeg instead of
> the internal JPX decoder.

I think you are right. While checking, I looked at the source only,
not realizing that it's not relevant for the built binary packages due
to your note.

I changed the severity, and in the security-tracker it is now marked
as 'unimportant', which is the tag used when a source is affected, but
the issue does not affect the built binary packages.

Thanks a lot for checking the bugreport!

Salvatore



Severity set to 'minor' from 'important' Request was from Salvatore Bonaccorso <carnil@debian.org> to 863016-submit@bugs.debian.org. (Sat, 20 May 2017 13:24:03 GMT) (full text, mbox, link).


Added tag(s) fixed-upstream. Request was from debian-bts-link@lists.debian.org to control@bugs.debian.org. (Thu, 19 Apr 2018 17:09:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:36:00 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.