vulnerability
Red Hat: CVE-2019-9959: CVE-2019-9959 poppler: integer overflow in JPXStream::init function leading to memory consumption (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Jul 22, 2019 | Sep 12, 2019 | Jul 9, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Jul 22, 2019
Added
Sep 12, 2019
Modified
Jul 9, 2025
Description
The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo.
Solution(s)
no-fix-redhat-rpm-packageredhat-upgrade-evinceredhat-upgrade-evince-browser-pluginredhat-upgrade-evince-debuginforedhat-upgrade-evince-develredhat-upgrade-evince-dviredhat-upgrade-evince-libsredhat-upgrade-evince-nautilusredhat-upgrade-popplerredhat-upgrade-poppler-cppredhat-upgrade-poppler-cpp-debuginforedhat-upgrade-poppler-cpp-develredhat-upgrade-poppler-debuginforedhat-upgrade-poppler-debugsourceredhat-upgrade-poppler-demosredhat-upgrade-poppler-develredhat-upgrade-poppler-glibredhat-upgrade-poppler-glib-debuginforedhat-upgrade-poppler-glib-develredhat-upgrade-poppler-qtredhat-upgrade-poppler-qt-develredhat-upgrade-poppler-qt5redhat-upgrade-poppler-qt5-debuginforedhat-upgrade-poppler-qt5-develredhat-upgrade-poppler-utilsredhat-upgrade-poppler-utils-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.