Name | CVE-2018-13988 |
Description | Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1562-1, ELA-689-1 |
Debian Bugs | 904922 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
poppler (PTS) | jessie, jessie (lts) | 0.26.5-2+deb8u16 | fixed |
| stretch (security) | 0.48.0-2+deb9u4 | vulnerable |
| stretch (lts), stretch | 0.48.0-2+deb9u6 | fixed |
| buster (security), buster, buster (lts) | 0.71.0-5+deb10u3 | fixed |
| bullseye (security), bullseye | 20.09.0-3.1+deb11u1 | fixed |
| bookworm | 22.12.0-2 | fixed |
| sid, trixie | 24.08.0-3 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - poppler <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=1602838
https://cgit.freedesktop.org/poppler/poppler/commit/?id=004e3c10df0abda214f0c293f9e269fdd979c5ee (poppler-0.67.0)