Bug 1912912 (CVE-2020-35702) - CVE-2020-35702 poppler: heap-based buffer overflow via a crafted PDF document
Summary: CVE-2020-35702 poppler: heap-based buffer overflow via a crafted PDF document
Alias: CVE-2020-35702
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On:
Blocks: 1899505
TreeView+ depends on / blocked
Reported: 2021-01-05 15:11 UTC by Marian Rehak
Modified: 2021-09-23 14:19 UTC (History)
8 users (show)

Fixed In Version: poppler 21.01.0
Doc Type: If docs needed, set a value
Doc Text:
A heap buffer overflow flaw was found in poppler. This flaw allows a remote attacker to provide a specially crafted PDF file that, when processed by the 'pdftops' program, leads to a crash or potential code execution. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
Clone Of:
Last Closed: 2021-03-01 19:01:50 UTC

Attachments (Terms of Use)

Description Marian Rehak 2021-01-05 15:11:17 UTC
DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects.

Upstream Reference:


Comment 3 Mauro Matteo Cascella 2021-03-01 14:00:15 UTC
It looks like this flaw was introduced in Poppler 21.01.0 via commit [1] and fixed in the same release via commit ae614bf8ab (see previous comment).

[1] https://gitlab.freedesktop.org/poppler/poppler/-/commit/f1c3ded779582aef5f2cbaf29bc5da7a8eae6f69

Comment 4 Mauro Matteo Cascella 2021-03-01 14:03:36 UTC

The versions of `poppler` as shipped with Red Hat Enterprise Linux are not affected by this flaw, as the vulnerable code was introduced in a newer version of the package.

Comment 6 Product Security DevOps Team 2021-03-01 19:01:50 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Note You need to log in before you can comment on or make changes to this bug.