Bugzilla – Bug 859427
VUL-0: CVE-2013-7296: poppler: DoS due to a format string error
Last modified: 2014-07-02 10:02:42 UTC
CVE-2013-7296 Agostino Sarubbo via Gentoo Bugzilla: A vulnerability has been reported in Poppler, which can be exploited by malicious people to cause a DoS (Denial of Service) in an application using the library. The vulnerability is caused due to a format string error when handling extraneous bytes within a segment in the "JBIG2Stream::readSegments()" method (JBIG2Stream.cc), which can be exploited to cause a crash. - fixed in poppler 0.24.5 Fix: http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.24&id=58e04a08afee39370283c494ee2e4e392fd3b684 References: https://bugs.gentoo.org/show_bug.cgi?id=496770 http://comments.gmane.org/gmane.comp.security.oss.general/11878 https://bugs.kde.org/show_bug.cgi?id=328511 http://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee https://bugzilla.redhat.com/show_bug.cgi?id=1048199
bugbot adjusting priority
https://build.opensuse.org/request/show/214720
.
openSUSE-SU-2014:0185-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 859427 CVE References: CVE-2013-7296 Sources used: openSUSE 13.1 (src): poppler-0.24.3-4.1, poppler-qt-0.24.3-4.1 openSUSE 12.3 (src): poppler-0.22.1-1.4.1, poppler-qt-0.22.1-1.4.1
openSUSE-SU-2014:0255-1: An update that fixes four vulnerabilities is now available. Category: security (low) Bug References: 806793,859427 CVE References: CVE-2013-1788,CVE-2013-1789,CVE-2013-1790,CVE-2013-7296 Sources used: openSUSE 11.4 (src): poppler-0.14.4-13.1
Released
segExtraBytes is "int" in SLE11 poppler, so its not affected.