First published: Sun May 06 2018(Updated: )
Poppler is vulnerable to a NULL pointer dereference in the Annot.h:AnnotPath::getCoordsLength() function. An attacker could exploit this to cause a denial of service via crafted PDF. Upstream Bug: <a href="https://bugs.freedesktop.org/show_bug.cgi?id=106408">https://bugs.freedesktop.org/show_bug.cgi?id=106408</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
freedesktop poppler | <0.41.0 | |
Canonical Ubuntu Linux | =14.04 | |
Debian Debian Linux | =8.0 | |
Redhat Ansible Tower | =3.3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
ubuntu/poppler | <0.24.5-2ubuntu4.11 | 0.24.5-2ubuntu4.11 |
debian/poppler | 20.09.0-3.1+deb11u1 22.12.0-2 24.02.0-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10768 is a vulnerability that allows for a NULL pointer dereference in the AnnotPath::getCoordsLength function in Annot.h in an Ubuntu package for Poppler 0.24.5, leading to a remote denial of service attack.
The affected software includes the Ubuntu package for Poppler 0.24.5.
CVE-2018-10768 has a severity level of medium, with a CVSS score of 6.5.
To fix CVE-2018-10768, update your Ubuntu package for Poppler to version 0.24.5-2ubuntu4.11 or a later version that is not affected.
You can find more information about CVE-2018-10768 at the following references: [Link 1](https://bugs.freedesktop.org/show_bug.cgi?id=106408), [Link 2](https://usn.ubuntu.com/3647-1/), [Link 3](https://access.redhat.com/errata/RHSA-2018:3140).