{"id":"RHSA-2019:2713","summary":"Red Hat Security Advisory: poppler security update","modified":"2026-01-14T11:03:20.364230Z","published":"2024-09-16T02:32:30Z","upstream":["CVE-2018-18897","CVE-2018-20481","CVE-2018-20551","CVE-2018-20650","CVE-2018-20662","CVE-2019-10871","CVE-2019-12293","CVE-2019-7310","CVE-2019-9200","CVE-2019-9631","CVE-2019-9903","CVE-2019-9959"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646546"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665259"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665266"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665273"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672419"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1683632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1686802"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1691724"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1696636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1713582"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732340"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2713.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-18897"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-18897"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-18897"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20481"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20481"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20481"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20551"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20551"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20551"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20650"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20650"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20650"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20662"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20662"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20662"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-7310"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-7310"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7310"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9200"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9200"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9200"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9631"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9631"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9631"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9903"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9903"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9903"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9959"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9959"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9959"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-10871"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-10871"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10871"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-12293"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-12293"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12293"}],"affected":[{"package":{"name":"poppler","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-cpp","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-cpp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-cpp-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-cpp-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-cpp-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-cpp-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-glib","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-glib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-glib-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-glib-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-glib-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-glib-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-qt5","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-qt5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-qt5-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-qt5-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-qt5-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-qt5-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-utils","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-utils"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-utils-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/poppler-utils-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-cpp","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-cpp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-cpp-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-cpp-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-cpp-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-cpp-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-debugsource","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-glib","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-glib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-glib-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-glib-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-glib-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-glib-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-qt5","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-qt5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-qt5-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-qt5-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-qt5-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-qt5-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-utils","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-utils"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}},{"package":{"name":"poppler-utils-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/poppler-utils-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.66.0-11.el8_0.12"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2019:2713.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}]}