Resource Exhaustion Affecting poppler-qt5 package, versions *
Threat Intelligence
EPSS
0.05% (22nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-POPPLERQT5-5861370
- published 25 Aug 2023
- disclosed 28 Jul 2022
Introduced: 28 Jul 2022
CVE-2022-37052 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8 poppler-qt5.
NVD Description
Note: Versions mentioned in the description apply only to the upstream poppler-qt5 package and not the poppler-qt5 package as distributed by RHEL.
See How to fix? for RHEL:8 relevant fixed versions and status.
A reachable Object::getString assertion in Poppler 22.07.0 allows attackers to cause a denial of service due to a failure in markObject.
CVSS Scores
version 3.1