several crashes (DoS)

Related Vulnerabilities: CVE-2009-0756   CVE-2009-0755  

Debian Bug report logs - #518478
several crashes (DoS)

version graph

Package: libpoppler5; Maintainer for libpoppler5 is (unknown);

Reported by: Steffen Joeris <steffen.joeris@skolelinux.de>

Date: Fri, 6 Mar 2009 13:36:01 UTC

Severity: important

Tags: patch, security

Found in version poppler/0.8.7-1

Fixed in version 0.10.4-1

Done: Jakub Wilk <jwilk@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Loic Minier <lool@dooz.org>:
Bug#518478; Package libpoppler3. (Fri, 06 Mar 2009 13:36:04 GMT) (full text, mbox, link).


Acknowledgement sent to Steffen Joeris <steffen.joeris@skolelinux.de>:
New Bug report received and forwarded. Copy sent to Loic Minier <lool@dooz.org>. (Fri, 06 Mar 2009 13:36:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Steffen Joeris <steffen.joeris@skolelinux.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: several crashes (DoS)
Date: Sat, 07 Mar 2009 00:28:19 +1100
[Message part 1 (text/plain, inline)]
Package: libpoppler3
Version: 0.8.7-1
Severity: important
Tags: patch, security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for poppler.

CVE-2009-0756[0]:
| The JBIG2Stream::readSymbolDictSeg function in Poppler before 0.10.4
| allows remote attackers to cause a denial of service (crash) via a PDF
| file that triggers a parsing error, which is not properly handled by
| JBIG2SymbolDict::~JBIG2SymbolDict and triggers an invalid memory
| dereference.

CVE-2009-0755[1]:
| The FormWidgetChoice::loadDefaults function in Poppler before 0.10.4
| allows remote attackers to cause a denial of service (crash) via a PDF
| file with an invalid Form Opt entry.

I don't see any arbitrary code execution happening here, so the impact
is certainly not critical. I've taken the two patches for the CVEs from
upstream's changelog. I also included another patch, which claims to
fix a crash, maybe you want to have a look at it.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

Cheers
Steffen

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0756
    http://security-tracker.debian.net/tracker/CVE-2009-0756
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0755
    http://security-tracker.debian.net/tracker/CVE-2009-0755
[CVE-2009-0755.dos (text/plain, attachment)]
[CVE-2009-0756.dos (text/x-c++, attachment)]
[other-crash (text/x-c++, attachment)]

Bug reassigned from package 'libpoppler3' to 'libpoppler4'. Request was from Marco Rodrigues <gothicx@sapo.pt> to control@bugs.debian.org. (Sun, 02 Aug 2009 09:33:06 GMT) (full text, mbox, link).


Bug No longer marked as found in versions poppler/0.8.7-1. Request was from Marco Rodrigues <gothicx@sapo.pt> to control@bugs.debian.org. (Sun, 02 Aug 2009 09:33:07 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Loic Minier <lool@dooz.org>:
Bug#518478; Package libpoppler4. (Sun, 02 Aug 2009 09:51:14 GMT) (full text, mbox, link).


Acknowledgement sent to Marco Rodrigues <gothicx@sapo.pt>:
Extra info received and forwarded to list. Copy sent to Loic Minier <lool@dooz.org>. (Sun, 02 Aug 2009 09:51:16 GMT) (full text, mbox, link).


Message #14 received at 518478@bugs.debian.org (full text, mbox, reply):

From: Marco Rodrigues <gothicx@sapo.pt>
To: 518478@bugs.debian.org
Subject: Still vulnerable according to Debian CVE tracker
Date: Sun, 02 Aug 2009 10:35:53 +0100
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi!

Looks like it still has problems in etch.

http://security-tracker.debian.net/tracker/CVE-2009-0756

Bug reassigned to libpoppler4.

- --
Marco Rodrigues

http://Marco.Tondela.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQIcBAEBCAAGBQJKdV34AAoJENDqNB6bSPIzG2cP/0XsBU+WooVWHHTiqfFbkYFS
m2hVxgSxKJl58qaMm4IzV26zCP/9izWrCzYrTD5dXFocF3V6tEHopC2xDMHJ6VmE
cA5eQajZSl3NQFm0EQLYjMPzvyixG788zbboIJmzwKIgCCyB8imS9Egz/pyCFWf7
2B8aLbhj66ciX9IP1Bg0IppCPtPeG1FRgnHJ5kQdEgLhmREcyR3ZmvfZwBQ1egc3
mz3wOaEwGFb04LAueoGPxOVdlzynTBNRpxGL7zjdw4ljN1c3pL8sHqvOEInEe+eO
xhiPmqx59/D7MN6bFtHBXrO06YDpN5CJtvUdeeJajPeKWu7mQ9KyynaPuLz9Q5qP
5/VlmiHqapBVfXG8WKTbfi1l9cyMl80U8TaEZtbtLAZP6AXzXsHwMcbzK90GaY/a
1G68M/c9UlUTvGiiPxO8dHdXsRFlqFiEeunCobLOKuplGQaFNiNVE1giv4Nam7j6
Awfw2YEMZygD9TkQGHH+BnhhLQV/lhsD3y1qFMwyceHl7CPHtzayJOeR8eAwYKm0
Jxu+nNkk6+FkAqliA9BZ0WOCIf6AzGm7qAylG4FCcHFc/jXx35gvgSvFKqvTZxPK
uTYuyi+WOd/UaMwgV4KVZHr9pH00opyB7QK7cXm1DPsQTiOi+HMk/AaIcHiltCdk
WrbG1SAfpxTeZohLNV5g
=Vaat
-----END PGP SIGNATURE-----




Bug reassigned from package 'libpoppler4' to 'libpoppler5'. Request was from Jakub Wilk <jwilk@debian.org> to control@bugs.debian.org. (Fri, 05 Feb 2010 21:57:04 GMT) (full text, mbox, link).


Bug Marked as found in versions poppler/0.8.7-1. Request was from Jakub Wilk <jwilk@debian.org> to control@bugs.debian.org. (Fri, 05 Feb 2010 22:33:16 GMT) (full text, mbox, link).


Reply sent to Jakub Wilk <jwilk@debian.org>:
You have taken responsibility. (Sat, 06 Feb 2010 12:42:07 GMT) (full text, mbox, link).


Notification sent to Steffen Joeris <steffen.joeris@skolelinux.de>:
Bug acknowledged by developer. (Sat, 06 Feb 2010 12:42:07 GMT) (full text, mbox, link).


Message #23 received at 518478-done@bugs.debian.org (full text, mbox, reply):

From: Jakub Wilk <jwilk@debian.org>
To: 518478-done@bugs.debian.org
Subject: Re: Bug#518478: several crashes (DoS)
Date: Sat, 6 Feb 2010 13:36:23 +0100
[Message part 1 (text/plain, inline)]
Version: poppler/0.10.4-1

The bug was fixed upstream in poppler 0.10.4.

-- 
Jakub Wilk
[signature.asc (application/pgp-signature, inline)]

Bug Marked as fixed in versions 0.10.4-1. Request was from Jakub Wilk <jwilk@debian.org> to control@bugs.debian.org. (Sat, 06 Feb 2010 13:09:06 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 07 Mar 2010 07:41:18 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:17:11 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.