CVE-2025-52885 (CNNVD-202510-1394)

MEDIUM
中文标题:
Poppler 资源管理错误漏洞
英文标题:
GHSL-2025-042: Poppler has Use-After-Free
CVSS分数: 6.1
发布时间: 2025-10-10 22:11:20
漏洞类型: 资源管理错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Poppler是Poppler开源的一个PDF渲染库。 Poppler 25.10.0之前版本存在资源管理错误漏洞,该漏洞源于StructTreeRoot类中使用原始指针指向std::vector元素,可能导致释放后重用。

英文描述:

Poppler ia a library for rendering PDF files, and examining or modifying their structure. A use-after-free (write) vulnerability has been detected in versions Poppler prior to 25.10.0 within the StructTreeRoot class. The issue arises from the use of raw pointers to elements of a `std::vector`, which can lead to dangling pointers when the vector is resized. The vulnerability stems from the way that refToParentMap stores references to `std::vector` elements using raw pointers. These pointers may become invalid when the vector is resized. This vulnerability is a common security problem involving the use of raw pointers to `std::vectors`. Internally, `std::vector `stores its elements in a dynamically allocated array. When the array reaches its capacity and a new element is added, the vector reallocates a larger block of memory and moves all the existing elements to the new location. At this point if any pointers to elements are stored before a resize occurs, they become dangling pointers once the reallocation happens. Version 25.10.0 contains a patch for the issue.

CWE类型:
CWE-416
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
poppler poppler < 25.10.0 - - cpe:2.3:a:poppler:poppler:<_25.10.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://securitylab.github.com/advisories/GHSL-2025-042_poppler/ x_refsource_CONFIRM
cve.org
访问
https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1884 x_refsource_MISC
cve.org
访问
https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1884#note_3114334 x_refsource_MISC
cve.org
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
CVSS评分详情
4.0 (cna)
MEDIUM
6.1
CVSS向量: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
机密性
HIGH
完整性
HIGH
可用性
HIGH
后续系统影响 (Subsequent):
机密性
NONE
完整性
NONE
可用性
NONE
时间信息
发布时间:
2025-10-10 22:11:20
修改时间:
2025-11-04 21:11:41
创建时间:
2025-11-11 15:40:40
更新时间:
2025-11-11 16:00:16
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-52885 2025-11-11 15:23:27 2025-11-11 07:40:40
NVD nvd_CVE-2025-52885 2025-11-11 15:01:05 2025-11-11 07:48:27
CNNVD cnnvd_CNNVD-202510-1394 2025-11-11 15:12:29 2025-11-11 08:00:16
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:16
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-202510-1394; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 资源管理错误
  • cnnvd_id: 未提取 -> CNNVD-202510-1394
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:27
references_count: 3 → 4; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • references_count: 3 -> 4
  • data_sources: ['cve'] -> ['cve', 'nvd']