CVE-2017-14519

NameCVE-2017-14519
DescriptionIn Poppler 0.59.0, memory corruption occurs in a call to Object::streamGetChar in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and Gfx::doShowText calls (aka a Gfx.cc infinite loop).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1116-1, DSA-4079-1
NVD severitymedium
Debian Bugs876086

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
poppler (PTS)stretch0.48.0-2+deb9u2fixed
stretch (security)0.48.0-2+deb9u4fixed
buster0.71.0-5fixed
bullseye, sid20.09.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
popplersourcewheezy0.18.4-6+deb7u3DLA-1116-1
popplersourcejessie0.26.5-2+deb8u2DSA-4079-1
popplersourcestretch0.48.0-2+deb9u1DSA-4079-1
popplersource(unstable)0.61.1-2876086

Notes

https://bugs.freedesktop.org/show_bug.cgi?id=102701
https://cgit.freedesktop.org/poppler/poppler/commit/?id=aaf5327649e8f7371c9d3270e7813c43ddfd47ee

Search for package or bug name: Reporting problems