Out-of-bounds Read The advisory has been revoked - it doesn't affect any version of package poppler-glib-devel  (opens in a new tab)


Threat Intelligence

EPSS
0.16% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-POPPLERGLIBDEVEL-1330404
  • published26 Jul 2021
  • disclosed27 May 2019

Introduced: 27 May 2019

CVE-2019-12360  (opens in a new tab)
CWE-125  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream poppler-glib-devel package and not the poppler-glib-devel package as distributed by RHEL.

A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content.