Out-of-Bounds Affecting qpdf-doc package, versions *
Threat Intelligence
EPSS
0.1% (43rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-QPDFDOC-1566027
- published 28 Jul 2021
- disclosed 4 Jan 2021
Introduced: 4 Jan 2021
CVE-2021-36978 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:7 qpdf-doc.
NVD Description
Note: Versions mentioned in the description apply only to the upstream qpdf-doc package and not the qpdf-doc package as distributed by RHEL.
See How to fix? for RHEL:7 relevant fixed versions and status.
QPDF 9.x through 9.1.1 and 10.x through 10.0.4 has a heap-based buffer overflow in Pl_ASCII85Decoder::write (called from Pl_AES_PDF::flush and Pl_AES_PDF::finish) when a certain downstream write fails.
References
- https://access.redhat.com/security/cve/CVE-2021-36978
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28262
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qpdf/OSV-2020-2245.yaml
- https://github.com/qpdf/qpdf/commit/dc92574c10f3e2516ec6445b88c5d584f40df4e5
- https://lists.debian.org/debian-lts-announce/2023/08/msg00037.html
- https://github.com/qpdf/qpdf/issues/492
- https://security.gentoo.org/glsa/202401-20
CVSS Scores
version 3.1