Bug 1912912 (CVE-2020-35702)

Summary: CVE-2020-35702 poppler: heap-based buffer overflow via a crafted PDF document
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: caillon+fedoraproject, feborges, gnome-sig, mclasen, mkasik, rdieter, rhughes, rstrode
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: poppler 21.01.0 Doc Type: If docs needed, set a value
Doc Text:
A heap buffer overflow flaw was found in poppler. This flaw allows a remote attacker to provide a specially crafted PDF file that, when processed by the 'pdftops' program, leads to a crash or potential code execution. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-03-01 19:01:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On:    
Bug Blocks: 1899505    

Description Marian Rehak 2021-01-05 15:11:17 UTC
DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects.

Upstream Reference:


Comment 3 Mauro Matteo Cascella 2021-03-01 14:00:15 UTC
It looks like this flaw was introduced in Poppler 21.01.0 via commit [1] and fixed in the same release via commit ae614bf8ab (see previous comment).

[1] https://gitlab.freedesktop.org/poppler/poppler/-/commit/f1c3ded779582aef5f2cbaf29bc5da7a8eae6f69

Comment 4 Mauro Matteo Cascella 2021-03-01 14:03:36 UTC

The versions of `poppler` as shipped with Red Hat Enterprise Linux are not affected by this flaw, as the vulnerable code was introduced in a newer version of the package.

Comment 6 Product Security DevOps Team 2021-03-01 19:01:50 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):