Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 647377 - (CVE-2010-5110) CVE-2010-5110 poppler: heap based buffer overflow in DCTStream.cc
CVE-2010-5110 poppler: heap based buffer overflow in DCTStream.cc
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
Unspecified Unspecified
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20100127,repor...
: Security
: 645827 (view as bug list)
Depends On:
Blocks: 734207
  Show dependency treegraph
 
Reported: 2010-10-28 03:47 EDT by Huzaifa S. Sidhpurwala
Modified: 2018-01-29 20:01 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Huzaifa S. Sidhpurwala 2010-10-28 03:47:03 EDT
A heap based buffer overflow was found in the way poppler processed JPEG image data from certain pdf files. If a local user was tricked into opening a specially crafted pdf file, it could result in crash of applications linked against poppler, or possibly execute arbitrary code with the privileges of user running the application.

Upstream patch:
http://cgit.freedesktop.org/poppler/poppler/commit/?id=fc071d800cb4329a3ccf898d7bf16b4db7323ad8
Comment 4 Huzaifa S. Sidhpurwala 2013-10-16 03:52:37 EDT
*** Bug 645827 has been marked as a duplicate of this bug. ***
Comment 6 Huzaifa S. Sidhpurwala 2014-09-19 01:31:32 EDT
Statement:

This issue affects the version of poppler as shipped with Red Hat Enterprise Linux 5 and 6. This issue does not affect the version of poppler as shipped with Red Hat Enterprise Linux 7. A future update may address this issue.

Note You need to log in before you can comment on or make changes to this bug.