Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 16 Jan 2014 18:55:24 +0000
From: "mancha" <>
Subject: CVE Request - Poppler library: DoS fixed in 0.24.5


It was discovered the JBIG2Stream::readSegments function in the
Poppler library (prior to 0.24.5) does not properly handle
segExtraBytes values, which allows remote attackers to cause a
denial of service (application crash) via a crafted PDF that
triggers a segmentation fault caused by an improper format
control string. [1]

Upstream fix:

Would you please allocate a CVE for this issue? Thanks.



Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ