Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1602838 - (CVE-2018-13988) CVE-2018-13988 poppler: out of bounds read in pdfunite
CVE-2018-13988 poppler: out of bounds read in pdfunite
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180723,reported=2...
: Security
Depends On: 1607462 1607461 1607463 1609036
Blocks: 1602839
  Show dependency treegraph
 
Reported: 2018-07-18 11:27 EDT by Laura Pardo
Modified: 2018-10-30 03:42 EDT (History)
12 users (show)

See Also:
Fixed In Version: poppler 0.67.0
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3140 None None None 2018-10-30 03:42 EDT

  None (edit)
Description Laura Pardo 2018-07-18 11:27:08 EDT
An out-of-bounds read flaw was found in the Poppler library as demonstrated by pdfunite. This may result in a denial of service or other undefined behavior. This flaw may be exploitable when a victim opens a specially crafted PDF file.

Upstream Patch: https://cgit.freedesktop.org/poppler/poppler/commit/?id=004e3c10df0abda214f0c293f9e269fdd979c5ee
Comment 1 Laura Pardo 2018-07-23 11:12:49 EDT
Acknowledgments:

Name: Hosein Askari
Comment 2 Laura Pardo 2018-07-23 11:14:14 EDT
Created mingw-poppler tracking bugs for this issue:

Affects: fedora-all [bug 1607462]


Created poppler tracking bugs for this issue:

Affects: fedora-all [bug 1607461]
Comment 4 Scott Gayou 2018-07-26 13:59:57 EDT
Downgrading this to low. No obvious, quickly discovered evidence that this leads to a buffer overflow. Looks like an out of bounds read triggering a segfault. 

Program received signal SIGSEGV, Segmentation fault.
0x00007ffff7abc1c1 in XRef::getEntry (this=this@entry=0x6372c0, i=-45027, complainIfMissing=complainIfMissing@entry=true)
    at XRef.cc:1609
1609	  if (i >= size || entries[i].type == xrefEntryNone) {

Offsets negatively into entries and triggers the segfault.
Comment 5 Scott Gayou 2018-07-26 14:16:30 EDT
This was de-embargoed after the reporter reported this upstream, agreed on a release, and the patch came out.
Comment 7 Scott Gayou 2018-07-26 14:23:03 EDT
Statement:

Red Hat Product Security has rated this issue as having a security impact of Low, and a future update may address this flaw.
Comment 9 Scott Gayou 2018-07-26 15:09:20 EDT
RHEL 5 and 6 have similar code and look vulnerable due to the missing check. Untested as pdfunite was not shipped with those versions of poppler and due to low severity. Assumption is affected.
Comment 11 errata-xmlrpc 2018-10-30 03:42:51 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3140 https://access.redhat.com/errata/RHSA-2018:3140

Note You need to log in before you can comment on or make changes to this bug.