CVE-2007-3387: Integer overflow in poppler

Related Vulnerabilities: CVE-2007-3387  

Debian Bug report logs - #435460
CVE-2007-3387: Integer overflow in poppler

version graph

Package: libpoppler1; Maintainer for libpoppler1 is (unknown);

Reported by: Stefan Fritsch <sf@sfritsch.de>

Date: Tue, 31 Jul 2007 21:27:01 UTC

Severity: grave

Tags: patch, security

Found in version poppler/0.5.4-6

Fixed in version poppler/0.5.4-6.1

Done: Steffen Joeris <white@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Ondřej Surý <ondrej@debian.org>:
Bug#435460; Package libpoppler1. (full text, mbox, link).


Acknowledgement sent to Stefan Fritsch <sf@sfritsch.de>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Ondřej Surý <ondrej@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Stefan Fritsch <sf@sfritsch.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2007-3387: Integer overflow in poppler
Date: Tue, 31 Jul 2007 23:24:03 +0200
Package: libpoppler1
Version: 0.5.4-6
Severity: grave
Tags: security
Justification: user security hole


A vulnerability has been found in libpoppler and related
packages. From CVE-2007-3387:

"Integer overflow in the StreamPredictor::StreamPredictor function in gpdf before
2.8.2, as used in (1) poppler, (2) xpdf, (3) kpdf, (4) kdegraphics, (5) CUPS,
and other products, might allow remote attackers to execute arbitrary code via a
crafted PDF file."

Please mention the CVE id in the changelog.



Bug 435460 cloned as bug 435462. Request was from Stefan Fritsch <sf@debian.org> to control@bugs.debian.org. (Tue, 31 Jul 2007 21:36:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Ondřej Surý <ondrej@debian.org>:
Bug#435460; Package libpoppler1. (full text, mbox, link).


Acknowledgement sent to Steffen Joeris <steffen.joeris@skolelinux.de>:
Extra info received and forwarded to list. Copy sent to Ondřej Surý <ondrej@debian.org>. (full text, mbox, link).


Message #12 received at 435460@bugs.debian.org (full text, mbox, reply):

From: Steffen Joeris <steffen.joeris@skolelinux.de>
To: 435460@bugs.debian.org
Subject: add NMU patch
Date: Sun, 5 Aug 2007 23:34:14 +1000
[Message part 1 (text/plain, inline)]
Hi

Attached, you will find a patch to fix this integer overflow.
If you do not have the time to deal with it atm, please give me permission to 
upload this NMU.
Thanks for your efforts.

Cheers
Steffen
[nmu.patch (text/x-diff, attachment)]
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Ondřej Surý <ondrej@debian.org>:
Bug#435460; Package libpoppler1. (full text, mbox, link).


Acknowledgement sent to Steffen Joeris <steffen.joeris@skolelinux.de>:
Extra info received and forwarded to list. Copy sent to Ondřej Surý <ondrej@debian.org>. (full text, mbox, link).


Message #17 received at 435460@bugs.debian.org (full text, mbox, reply):

From: Steffen Joeris <steffen.joeris@skolelinux.de>
To: 435460@bugs.debian.org
Subject: add patch
Date: Sun, 5 Aug 2007 23:34:38 +1000
tags 435460 patch
thanks



Tags added: patch Request was from Steffen Joeris <steffen.joeris@skolelinux.de> to control@bugs.debian.org. (Sun, 05 Aug 2007 13:36:04 GMT) (full text, mbox, link).


Reply sent to Steffen Joeris <white@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Stefan Fritsch <sf@sfritsch.de>:
Bug acknowledged by developer. (full text, mbox, link).


Message #24 received at 435460-close@bugs.debian.org (full text, mbox, reply):

From: Steffen Joeris <white@debian.org>
To: 435460-close@bugs.debian.org
Subject: Bug#435460: fixed in poppler 0.5.4-6.1
Date: Fri, 10 Aug 2007 04:17:03 +0000
Source: poppler
Source-Version: 0.5.4-6.1

We believe that the bug you reported is fixed in the latest version of
poppler, which is due to be installed in the Debian FTP archive:

libpoppler-dev_0.5.4-6.1_i386.deb
  to pool/main/p/poppler/libpoppler-dev_0.5.4-6.1_i386.deb
libpoppler-glib-dev_0.5.4-6.1_i386.deb
  to pool/main/p/poppler/libpoppler-glib-dev_0.5.4-6.1_i386.deb
libpoppler-glib1_0.5.4-6.1_i386.deb
  to pool/main/p/poppler/libpoppler-glib1_0.5.4-6.1_i386.deb
libpoppler-qt-dev_0.5.4-6.1_i386.deb
  to pool/main/p/poppler/libpoppler-qt-dev_0.5.4-6.1_i386.deb
libpoppler-qt1_0.5.4-6.1_i386.deb
  to pool/main/p/poppler/libpoppler-qt1_0.5.4-6.1_i386.deb
libpoppler-qt4-1_0.5.4-6.1_i386.deb
  to pool/main/p/poppler/libpoppler-qt4-1_0.5.4-6.1_i386.deb
libpoppler-qt4-dev_0.5.4-6.1_i386.deb
  to pool/main/p/poppler/libpoppler-qt4-dev_0.5.4-6.1_i386.deb
libpoppler1_0.5.4-6.1_i386.deb
  to pool/main/p/poppler/libpoppler1_0.5.4-6.1_i386.deb
poppler-utils_0.5.4-6.1_i386.deb
  to pool/main/p/poppler/poppler-utils_0.5.4-6.1_i386.deb
poppler_0.5.4-6.1.diff.gz
  to pool/main/p/poppler/poppler_0.5.4-6.1.diff.gz
poppler_0.5.4-6.1.dsc
  to pool/main/p/poppler/poppler_0.5.4-6.1.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 435460@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steffen Joeris <white@debian.org> (supplier of updated poppler package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 05 Aug 2007 11:08:24 +0000
Source: poppler
Binary: libpoppler-glib-dev poppler-utils libpoppler-qt4-dev libpoppler-qt1 libpoppler1 libpoppler-glib1 libpoppler-qt4-1 libpoppler-dev libpoppler-qt-dev
Architecture: source i386
Version: 0.5.4-6.1
Distribution: unstable
Urgency: high
Maintainer: Ondřej Surý <ondrej@debian.org>
Changed-By: Steffen Joeris <white@debian.org>
Description: 
 libpoppler-dev - PDF rendering library -- development files
 libpoppler-glib-dev - PDF rendering library -- development files (GLib interface)
 libpoppler-glib1 - PDF rendering library (GLib-based shared library)
 libpoppler-qt-dev - PDF rendering library -- development files (Qt 3 interface)
 libpoppler-qt1 - PDF rendering library (Qt 3 based shared library)
 libpoppler-qt4-1 - PDF rendering library (Qt 4 based shared library)
 libpoppler-qt4-dev - PDF rendering library -- development files (Qt 4 interface)
 libpoppler1 - PDF rendering library
 poppler-utils - PDF utilitites (based on libpoppler)
Closes: 435460
Changes: 
 poppler (0.5.4-6.1) unstable; urgency=high
 .
   * Non-maintainer upload
   * Include upstream patch to fix integer overflow in the
     StreamPredictor::StreamPredictor function
     (Closes: #435460) Fixes: CVE-2007-3387
Files: 
 55c8573e83e17a24de3561bf515f7331 1086 devel optional poppler_0.5.4-6.1.dsc
 33447ce4205fd491884376fca24410ba 9930 devel optional poppler_0.5.4-6.1.diff.gz
 ed2625dff323c4a8383f9733fdaf560c 578854 libs optional libpoppler1_0.5.4-6.1_i386.deb
 3702de8f758747eebda2a23c96d80c05 767476 libdevel optional libpoppler-dev_0.5.4-6.1_i386.deb
 dfd53f60d7a15edd72b577505ed58fb0 72194 libs optional libpoppler-glib1_0.5.4-6.1_i386.deb
 503d1eedc5c55cefa00e979ea42dd6cd 100822 libdevel optional libpoppler-glib-dev_0.5.4-6.1_i386.deb
 dbc4eee1926ffd8df621797d88303d85 60288 libs optional libpoppler-qt1_0.5.4-6.1_i386.deb
 2ab9d3ab0f7f5f69bf76d50eb8fbc0b5 64070 libdevel optional libpoppler-qt-dev_0.5.4-6.1_i386.deb
 4e9f14a86d3216e47c9fd0e9a4ccc891 152192 libs optional libpoppler-qt4-1_0.5.4-6.1_i386.deb
 304ba69396149635c639b54dc3e58776 174050 libdevel optional libpoppler-qt4-dev_0.5.4-6.1_i386.deb
 97fbbdec9212685f2c5156a79b4c5180 103306 utils optional poppler-utils_0.5.4-6.1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGu+Mo62zWxYk/rQcRAuaVAKClhX2BeIsMQWRVlnH/I4vHiA0fwgCbBTTG
GgHQgdAWtue4Anrgv5vzSYs=
=NTzd
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 01 Dec 2007 07:33:40 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:38:08 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.