CVE-2017-9083
Publication date 19 May 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.
Status
Package | Ubuntu Release | Status |
---|---|---|
luatex | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
poppler | ||
18.04 LTS bionic |
Fixed 0.48.0-2ubuntu3
|
|
16.04 LTS xenial |
Fixed 0.41.0-0ubuntu1.2
|
|
14.04 LTS trusty |
Fixed 0.24.5-2ubuntu4.5
|
|
texlive-bin | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release |
Notes
seth-arnold
I didn't inspect texlive-bin or luatex closely since I didn't spot a patch quickly
mdeslaur
while Debian uses openjpeg, Ubuntu uses the internal JPX decoder texlive-bin is built with --with-system-poppler and --with-system-xpdf, so embedded code copy isn't used.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3350-1
- poppler vulnerabilities
- 7 July 2017