{"id":"USN-6273-1","summary":"poppler vulnerabilities","details":"Jieyong Ma discovered that poppler incorrectly handled certain malformed\nPDF files. A remote attacker could possibly use this issue to cause poppler\nto crash, resulting in a denial of service. This issue only affected Ubuntu\n20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-27337)\n\nIt was discovered that poppler incorrectly handled certain malformed PDF\nfiles. A remote attacker could possibly use this issue to cause poppler to\ncrash, resulting in a denial of service. This issue only affected Ubuntu\n22.04 LTS and Ubuntu 23.04. (CVE-2023-34872)\n","modified":"2026-04-22T10:37:33.465783Z","published":"2023-08-03T13:39:24Z","related":["UBUNTU-CVE-2022-27337","UBUNTU-CVE-2023-34872"],"upstream":["CVE-2022-27337","CVE-2023-34872","UBUNTU-CVE-2022-27337","UBUNTU-CVE-2023-34872"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6273-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27337"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-34872"}],"affected":[{"package":{"name":"poppler","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/poppler@0.86.1-0ubuntu1.2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.86.1-0ubuntu1.2"}]}],"versions":["0.80.0-0ubuntu1","0.80.0-0ubuntu3","0.80.0-0ubuntu4","0.80.0-0ubuntu5","0.85.0-1ubuntu1","0.85.0-1ubuntu3","0.86.1-0ubuntu1","0.86.1-0ubuntu1.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"0.86.1-0ubuntu1.2","binary_name":"gir1.2-poppler-0.18"},{"binary_version":"0.86.1-0ubuntu1.2","binary_name":"libpoppler-cpp0v5"},{"binary_version":"0.86.1-0ubuntu1.2","binary_name":"libpoppler-glib8"},{"binary_version":"0.86.1-0ubuntu1.2","binary_name":"libpoppler-qt5-1"},{"binary_version":"0.86.1-0ubuntu1.2","binary_name":"libpoppler97"},{"binary_version":"0.86.1-0ubuntu1.2","binary_name":"poppler-utils"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6273-1.json","cves_map":{"cves":[{"id":"CVE-2022-27337","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"poppler","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/poppler@22.02.0-2ubuntu0.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"22.02.0-2ubuntu0.2"}]}],"versions":["21.06.1-1","21.11.0-1~ubuntu2","22.02.0-2","22.02.0-2ubuntu0.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"22.02.0-2ubuntu0.2","binary_name":"gir1.2-poppler-0.18"},{"binary_version":"22.02.0-2ubuntu0.2","binary_name":"libpoppler-cpp0v5"},{"binary_version":"22.02.0-2ubuntu0.2","binary_name":"libpoppler-glib8"},{"binary_version":"22.02.0-2ubuntu0.2","binary_name":"libpoppler-qt5-1"},{"binary_version":"22.02.0-2ubuntu0.2","binary_name":"libpoppler118"},{"binary_version":"22.02.0-2ubuntu0.2","binary_name":"poppler-utils"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6273-1.json","cves_map":{"cves":[{"id":"CVE-2022-27337","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2023-34872","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.5"}