{"id":"MGASA-2018-0358","summary":"Updated poppler packages fix security vulnerability","details":"The updated packages fix a security vulnerability:\n\nPoppler through 0.62 contains an out of bounds read vulnerability due to\nan incorrect memory access that is not mapped in its memory space, as\ndemonstrated by pdfunite. This can result in memory corruption and denial\nof service. This may be exploitable when a victim opens a specially\ncrafted PDF file (CVE-2018-13988).\n","modified":"2026-04-16T06:23:03.009182971Z","published":"2018-08-31T21:11:59Z","upstream":["CVE-2018-13988"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0358.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=23383"}],"affected":[{"package":{"name":"poppler","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/poppler?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.52.0-3.8.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0358.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}