<html>
    <head>
      <base href="https://bugs.freedesktop.org/">
    </head>
    <body><table border="1" cellspacing="0" cellpadding="8">
        <tr>
          <th>Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_NEW "
   title="NEW - Infinite recursion at cairo-mesh-pattern-rasterizer.c:848"
   href="https://bugs.freedesktop.org/show_bug.cgi?id=101550">101550</a>
          </td>
        </tr>

        <tr>
          <th>Summary</th>
          <td>Infinite recursion at cairo-mesh-pattern-rasterizer.c:848
          </td>
        </tr>

        <tr>
          <th>Product</th>
          <td>poppler
          </td>
        </tr>

        <tr>
          <th>Version</th>
          <td>unspecified
          </td>
        </tr>

        <tr>
          <th>Hardware</th>
          <td>Other
          </td>
        </tr>

        <tr>
          <th>OS</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th>Status</th>
          <td>NEW
          </td>
        </tr>

        <tr>
          <th>Severity</th>
          <td>normal
          </td>
        </tr>

        <tr>
          <th>Priority</th>
          <td>medium
          </td>
        </tr>

        <tr>
          <th>Component</th>
          <td>general
          </td>
        </tr>

        <tr>
          <th>Assignee</th>
          <td>poppler-bugs@lists.freedesktop.org
          </td>
        </tr>

        <tr>
          <th>Reporter</th>
          <td>foca@salesforce.com
          </td>
        </tr></table>
      <p>
        <div>
        <pre>Created <span class=""><a href="attachment.cgi?id=132125" name="attach_132125" title="Proof of concept">attachment 132125</a> <a href="attachment.cgi?id=132125&action=edit" title="Proof of concept">[details]</a></span>
Proof of concept

Hi, 

There is an infinite recursion in pdftocairo parsing the attached PoC1.pdf. As
a result of the infinite (or very deep) recursion all the stack space is
consumed and the application crashes.

The recursion happens at, cairo-mesh-pattern-rasterizer.c:848:
844                 subc[2][i] = 0.5 * (c[0][i] + c[2][i]);
845                 subc[3][i] = 0.5 * (c[1][i] + c[3][i]);
846             }
847     
848             draw_bezier_patch (data, width, height, stride, first, subc);
849     
850             for (i = 0; i < 4; ++i) {
851                 subc[0][i] = subc[2][i];
852                 subc[1][i] = subc[3][i];

This bug was found when using a poppler util, pdftocairo. A PoC is attached. To
reproduce the bug use:
pdftocairo -svg PoC1.pdf

This vulnerability has been found by Offensive Research at Salesforce.com:
Alberto Garcia (@algillera), Francisco Oca (@francisco_oca) & Suleman Ali
(@Salbei_)</pre>
        </div>
      </p>


      <hr>
      <span>You are receiving this mail because:</span>

      <ul>
          <li>You are the assignee for the bug.</li>
      </ul>
    </body>
</html>