Bug 1602838 (CVE-2018-13988)
Summary: | CVE-2018-13988 poppler: out of bounds read in pdfunite | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | alexl, feborges, john.j5live, manisandro, mclasen, mkasik, rdieter, rhughes, rstrode, sandmann, security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | poppler 0.67.0 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:33:24 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1607461, 1607462, 1607463, 1609036 | ||
Bug Blocks: | 1602839 |
Description
Laura Pardo
2018-07-18 15:27:08 UTC
Acknowledgments: Name: Hosein Askari Created mingw-poppler tracking bugs for this issue: Affects: fedora-all [bug 1607462] Created poppler tracking bugs for this issue: Affects: fedora-all [bug 1607461] Downgrading this to low. No obvious, quickly discovered evidence that this leads to a buffer overflow. Looks like an out of bounds read triggering a segfault. Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7abc1c1 in XRef::getEntry (this=this@entry=0x6372c0, i=-45027, complainIfMissing=complainIfMissing@entry=true) at XRef.cc:1609 1609 if (i >= size || entries[i].type == xrefEntryNone) { Offsets negatively into entries and triggers the segfault. This was de-embargoed after the reporter reported this upstream, agreed on a release, and the patch came out. Statement: Red Hat Product Security has rated this issue as having a security impact of Low, and a future update may address this flaw. RHEL 5 and 6 have similar code and look vulnerable due to the missing check. Untested as pdfunite was not shipped with those versions of poppler and due to low severity. Assumption is affected. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3140 https://access.redhat.com/errata/RHSA-2018:3140 |