First published: Tue Aug 22 2023(Updated: )
An issue was discovered in Poppler 22.07.0. There is a reachable abort which leads to denial of service because the main function in pdfunite.cc lacks a stream check before saving an embedded file.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/poppler | <22.08.0-2 | 22.08.0-2 |
ubuntu/poppler | <0.62.0-2ubuntu2.14+ | 0.62.0-2ubuntu2.14+ |
ubuntu/poppler | <0.86.1-0ubuntu1.4 | 0.86.1-0ubuntu1.4 |
ubuntu/poppler | <22.02.0-2ubuntu0.3 | 22.02.0-2ubuntu0.3 |
ubuntu/poppler | <0.41.0-0ubuntu1.16+ | 0.41.0-0ubuntu1.16+ |
freedesktop poppler | =22.07.0 | |
Debian Debian Linux | =10.0 | |
=22.07.0 | ||
=10.0 | ||
debian/poppler | <=0.71.0-5<=20.09.0-3.1+deb11u1 | 0.71.0-5+deb10u3 22.12.0-2 |
https://gitlab.freedesktop.org/poppler/poppler/-/commit/4631115647c1e4f0482ffe0491c2f38d2231337b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37051 is a vulnerability in Poppler 22.07.0 that allows for denial of service due to a reachable abort in the main function of pdfunite.cc.
CVE-2022-37051 has a severity of 6.5 (medium).
CVE-2022-37051 affects Poppler 22.07.0 by causing denial of service through a reachable abort in the main function of pdfunite.cc.
To fix CVE-2022-37051, it is recommended to update to a version of Poppler that includes the patch provided by the upstream vendor.
More information about CVE-2022-37051 can be found in the references provided: [Reference 1](https://gitlab.freedesktop.org/poppler/poppler/-/commit/4631115647c1e4f0482ffe0491c2f38d2231337b) [Reference 2](https://gitlab.freedesktop.org/poppler/poppler/-/issues/1276)