Name | CVE-2019-12957 |
Description | In Xpdf 4.01.01, a buffer over-read could be triggered in FoFiType1C::convertToType1 in fofi/FoFiType1C.cc when the index number is larger than the charset array bounds. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
poppler (PTS) | jessie, jessie (lts) | 0.26.5-2+deb8u16 | fixed |
stretch (security) | 0.48.0-2+deb9u4 | fixed | |
stretch (lts), stretch | 0.48.0-2+deb9u6 | fixed | |
buster (security), buster, buster (lts) | 0.71.0-5+deb10u3 | fixed | |
bullseye (security), bullseye | 20.09.0-3.1+deb11u1 | fixed | |
bookworm | 22.12.0-2 | fixed | |
sid, trixie | 24.08.0-3 | fixed | |
xpdf (PTS) | jessie | 3.03-17 | fixed |
stretch | 3.04-4 | fixed | |
buster | 3.04-13 | fixed | |
bullseye | 3.04+git20210103-3 | fixed | |
bookworm | 3.04+git20220601-1 | fixed | |
sid, trixie | 3.04+git20240613-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
poppler | source | wheezy | (unfixed) | end-of-life | ||
poppler | source | (unstable) | 0.22.5-4 | |||
xpdf | source | (unstable) | (not affected) |
- xpdf <not-affected> (xpdf in Debian uses poppler, which is fixed)
poppler fix: https://gitlab.freedesktop.org/poppler/poppler/commit/96931732f343d2bbda9af9488b485da031866c3b