vulnerability
Red Hat: CVE-2019-7310: CVE-2019-7310 poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | 2019-02-03 | 2019-08-07 | 2024-11-27 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
2019-02-03
Added
2019-08-07
Modified
2024-11-27
Description
In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document, as demonstrated by pdftocairo.
Solution(s)
redhat-upgrade-evinceredhat-upgrade-evince-browser-pluginredhat-upgrade-evince-debuginforedhat-upgrade-evince-develredhat-upgrade-evince-dviredhat-upgrade-evince-libsredhat-upgrade-evince-nautilusredhat-upgrade-okularredhat-upgrade-okular-debuginforedhat-upgrade-okular-develredhat-upgrade-okular-libsredhat-upgrade-okular-partredhat-upgrade-popplerredhat-upgrade-poppler-cppredhat-upgrade-poppler-cpp-debuginforedhat-upgrade-poppler-cpp-develredhat-upgrade-poppler-debuginforedhat-upgrade-poppler-debugsourceredhat-upgrade-poppler-demosredhat-upgrade-poppler-develredhat-upgrade-poppler-glibredhat-upgrade-poppler-glib-debuginforedhat-upgrade-poppler-glib-develredhat-upgrade-poppler-qtredhat-upgrade-poppler-qt-develredhat-upgrade-poppler-qt5redhat-upgrade-poppler-qt5-debuginforedhat-upgrade-poppler-qt5-develredhat-upgrade-poppler-utilsredhat-upgrade-poppler-utils-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.