UBUNTU-CVE-2020-25725

Source
https://ubuntu.com/security/CVE-2020-25725
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-25725.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2020-25725
Upstream
Published
2020-11-21T06:15:00Z
Modified
2026-01-20T17:14:41.340272Z
Severity
  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

In Xpdf 4.02, SplashOutputDev::endType3Char(GfxState *state) SplashOutputDev.cc:3079 is trying to use the freed t3GlyphStack->cache, which causes an heap-use-after-free problem. The codes of a previous fix for nested Type 3 characters wasn't correctly handling the case where a Type 3 char referred to another char in the same Type 3 font.

References

Affected packages

Ubuntu:16.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.1.10-1.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.1.4-2.1
7.1.8-1
7.1.10-1
7.1.10-1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "7.1.10-1.1",
            "binary_name": "ipe"
        },
        {
            "binary_version": "7.1.10-1.1",
            "binary_name": "libipe-dev"
        },
        {
            "binary_version": "7.1.10-1.1",
            "binary_name": "libipe7.1.10"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-25725.json"
Ubuntu:18.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.7-3?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.7-2
7.2.7-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "7.2.7-3",
            "binary_name": "ipe"
        },
        {
            "binary_version": "7.2.7-3",
            "binary_name": "libipe-dev"
        },
        {
            "binary_version": "7.2.7-3",
            "binary_name": "libipe7.2.7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-25725.json"
Ubuntu:20.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.13-2build1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.9-1
7.2.13-2
7.2.13-2build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "7.2.13-2build1",
            "binary_name": "ipe"
        },
        {
            "binary_version": "7.2.13-2build1",
            "binary_name": "libipe-dev"
        },
        {
            "binary_version": "7.2.13-2build1",
            "binary_name": "libipe7.2.13"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-25725.json"
Ubuntu:22.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.24+dfsg1-1build1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.23+dfsg1-2
7.2.24+dfsg1-1
7.2.24+dfsg1-1build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "7.2.24+dfsg1-1build1",
            "binary_name": "ipe"
        },
        {
            "binary_version": "7.2.24+dfsg1-1build1",
            "binary_name": "libipe-dev"
        },
        {
            "binary_version": "7.2.24+dfsg1-1build1",
            "binary_name": "libipe7.2.24"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-25725.json"
Ubuntu:24.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.28-2.1build4?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.27+dfsg1-2
7.2.28-2
7.2.28-2.1build2
7.2.28-2.1build3
7.2.28-2.1build4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "7.2.28-2.1build4",
            "binary_name": "ipe"
        },
        {
            "binary_version": "7.2.28-2.1build4",
            "binary_name": "libipe-dev"
        },
        {
            "binary_version": "7.2.28-2.1build4",
            "binary_name": "libipe7.2.28t64"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-25725.json"
Ubuntu:25.10
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.30-1build1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.30-1build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "7.2.30-1build1",
            "binary_name": "ipe"
        },
        {
            "binary_version": "7.2.30-1build1",
            "binary_name": "libipe-dev"
        },
        {
            "binary_version": "7.2.30-1build1",
            "binary_name": "libipe7.2.30"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-25725.json"