Bug 28474 - xpdf new security issues CVE-2020-35376 and CVE-2020-25725
Summary: xpdf new security issues CVE-2020-35376 and CVE-2020-25725
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7TOO MGA7-32-OK MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-02-27 19:09 CET by David Walser
Modified: 2021-03-04 17:55 CET (History)
8 users (show)

See Also:
Source RPM: xpdf-4.02-5.mga8.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2021-02-27 19:09:26 CET
Fedora has issued an advisory on February 11:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/VLOYVJSM54IL6I5RY4QTJGRS7PIEG44X/

The issues are fixed upstream in 4.03.

Mageia 7 and Mageia 8 are also affected.
David Walser 2021-02-27 19:09:44 CET

Whiteboard: (none) => MGA8TOO, MGA7TOO
Status comment: (none) => Fixed upstream in 4.03

Comment 1 Aurelien Oudelet 2021-02-28 20:39:19 CET
Hi, thanks for reporting this.
As there is no maintainer for this package I added the committers in CC.

(Please set the status to 'assigned' if you are working on it)

CC: (none) => jani.valimaa, joequant, nicolas.salguero, ouaurelien
Assignee: bugsquad => pkg-bugs

Comment 2 Nicolas Lécureuil 2021-02-28 22:53:43 CET
fixed in cauldron.

Fixed in mga7/8

src:
    - xpdf-4.03-1.mga7
    - xpdf-4.03-1.mga8

Status comment: Fixed upstream in 4.03 => (none)
CC: (none) => mageia
Assignee: pkg-bugs => qa-bugs
Version: Cauldron => 8
Whiteboard: MGA8TOO, MGA7TOO => MGA7TOO

Comment 3 Brian Rockwell 2021-03-01 04:29:29 CET
The following 7 packages are going to be installed:

- libqt5printsupport5-5.12.6-4.mga7.i586
- libqt5svg5-5.12.6-1.mga7.i586
- poppler-0.74.0-3.4.mga7.i586
- qtsvg5-5.12.6-1.mga7.i586
- x11-font-adobe-100dpi-1.0.3-7.mga7.noarch
- xpdf-4.03-1.mga7.i586
- xpdf-common-4.03-1.mga7.i586

----

ran xpdf against a large pdf no issues
pdftotext properly extracted txt
pdfinfo pulled heading information.

Works as designed

Whiteboard: MGA7TOO => MGA7TOO MGA7_32_OK
CC: (none) => brtians1

Brian Rockwell 2021-03-01 04:30:17 CET

Whiteboard: MGA7TOO MGA7_32_OK => MGA7TOO MGA7-32-OK

Comment 4 Brian Rockwell 2021-03-01 16:28:50 CET
$ uname -a
Linux localhost 5.10.16-desktop-1.mga8 #1 SMP Sat Feb 13 16:27:22 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux


The following 7 packages are going to be installed:

- lib64qt5printsupport5-5.15.2-4.mga8.x86_64
- lib64qt5svg5-5.15.2-1.mga8.x86_64
- poppler-20.12.1-1.mga8.x86_64
- qtsvg5-5.15.2-1.mga8.x86_64
- x11-font-adobe-100dpi-1.0.3-9.mga8.noarch
- xpdf-4.03-1.mga8.x86_64
- xpdf-common-4.03-1.mga8.x86_64

repeated the processes above as mga7.

Worked as designed

Whiteboard: MGA7TOO MGA7-32-OK => MGA7TOO MGA7-32-OK MGA8-64-OK

Comment 5 David Walser 2021-03-01 17:57:26 CET
Package list:
xpdf-4.03-1.mga7
xpdf-common-4.03-1.mga7
xpdf-4.03-1.mga8
xpdf-common-4.03-1.mga8
Comment 6 Thomas Andrews 2021-03-02 21:52:11 CET
Validating.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 7 David Walser 2021-03-03 00:45:01 CET
Advisory:
========================

Updated xpdf packages fix security vulnerabilities:

In Xpdf 4.02, SplashOutputDev::endType3Char(GfxState *state)
SplashOutputDev.cc:3079 is trying to use the freed `t3GlyphStack->cache`, which
causes an `heap-use-after-free` problem. The codes of a previous fix for nested
Type 3 characters wasn't correctly handling the case where a Type 3 char
referred to another char in the same Type 3 font (CVE-2020-25725).

Xpdf 4.02 allows stack consumption because of an incorrect subroutine reference
in a Type 1C font charstring, related to the FoFiType1C::getOp() function
(CVE-2020-35376).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35376
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/VLOYVJSM54IL6I5RY4QTJGRS7PIEG44X/
Comment 8 Aurelien Oudelet 2021-03-04 14:37:24 CET
Advisory pushed to SVN.

Keywords: (none) => advisory

Comment 9 Mageia Robot 2021-03-04 17:55:29 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0112.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.