Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-50422

Опубликовано: 04 авг. 2025
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

Cairo through 1.18.4, as used in Poppler through 25.08.0, has an "unscaled->face == NULL" assertion failure for _cairo_ft_unscaled_font_fini in cairo-ft-font.c.

A PDF parsing flaw has been discovered in poppler. This flaw may allow an attacker who can craft a malicious pdf file to induce a crash if they can convince their target to open the crafted pdf.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10popplerFix deferred
Red Hat Enterprise Linux 6popplerFix deferred
Red Hat Enterprise Linux 7compat-poppler022Fix deferred
Red Hat Enterprise Linux 7popplerFix deferred
Red Hat Enterprise Linux 8popplerFix deferred
Red Hat Enterprise Linux 9popplerFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2386347poppler: Poppler crash on malformed input

EPSS

Процентиль: 1%
0.00013
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 2.9
ubuntu
9 дней назад

An issue was discovered in freedesktop poppler v25.04.0. The heap memory containing PDF stream objects is not cleared upon program exit, allowing attackers to obtain sensitive PDF content via a memory dump.

CVSS3: 2.9
nvd
9 дней назад

Cairo through 1.18.4, as used in Poppler through 25.08.0, has an "unscaled->face == NULL" assertion failure for _cairo_ft_unscaled_font_fini in cairo-ft-font.c.

CVSS3: 2.9
debian
9 дней назад

Cairo through 1.18.4, as used in Poppler through 25.08.0, has an "unsc ...

CVSS3: 6.5
github
9 дней назад

An issue was discovered in freedesktop poppler v25.04.0. The heap memory containing PDF stream objects is not cleared upon program exit, allowing attackers to obtain sensitive PDF content via a memory dump.

EPSS

Процентиль: 1%
0.00013
Низкий

3.3 Low

CVSS3