UBUNTU-CVE-2022-30775

Source
https://ubuntu.com/security/CVE-2022-30775
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30775.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2022-30775
Upstream
Published
2022-05-16T03:15:00Z
Modified
2026-01-20T17:27:36.694418Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered by (for example) sending a crafted PDF document to the pdftoppm binary. It is most easily reproduced with the DCMAKECXXCOMPILER=afl-clang-fast++ option.

References

Affected packages

Ubuntu:16.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.1.10-1.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.1.4-2.1
7.1.8-1
7.1.10-1
7.1.10-1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ipe",
            "binary_version": "7.1.10-1.1"
        },
        {
            "binary_name": "libipe-dev",
            "binary_version": "7.1.10-1.1"
        },
        {
            "binary_name": "libipe7.1.10",
            "binary_version": "7.1.10-1.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30775.json"
Ubuntu:18.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.7-3?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.7-2
7.2.7-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ipe",
            "binary_version": "7.2.7-3"
        },
        {
            "binary_name": "libipe-dev",
            "binary_version": "7.2.7-3"
        },
        {
            "binary_name": "libipe7.2.7",
            "binary_version": "7.2.7-3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30775.json"
Ubuntu:20.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.13-2build1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.9-1
7.2.13-2
7.2.13-2build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ipe",
            "binary_version": "7.2.13-2build1"
        },
        {
            "binary_name": "libipe-dev",
            "binary_version": "7.2.13-2build1"
        },
        {
            "binary_name": "libipe7.2.13",
            "binary_version": "7.2.13-2build1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30775.json"
Ubuntu:22.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.24+dfsg1-1build1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.23+dfsg1-2
7.2.24+dfsg1-1
7.2.24+dfsg1-1build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ipe",
            "binary_version": "7.2.24+dfsg1-1build1"
        },
        {
            "binary_name": "libipe-dev",
            "binary_version": "7.2.24+dfsg1-1build1"
        },
        {
            "binary_name": "libipe7.2.24",
            "binary_version": "7.2.24+dfsg1-1build1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30775.json"
Ubuntu:24.04:LTS
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.28-2.1build4?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.27+dfsg1-2
7.2.28-2
7.2.28-2.1build2
7.2.28-2.1build3
7.2.28-2.1build4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ipe",
            "binary_version": "7.2.28-2.1build4"
        },
        {
            "binary_name": "libipe-dev",
            "binary_version": "7.2.28-2.1build4"
        },
        {
            "binary_name": "libipe7.2.28t64",
            "binary_version": "7.2.28-2.1build4"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30775.json"
Ubuntu:25.10
ipe

Package

Name
ipe
Purl
pkg:deb/ubuntu/ipe@7.2.30-1build1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.2.30-1build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ipe",
            "binary_version": "7.2.30-1build1"
        },
        {
            "binary_name": "libipe-dev",
            "binary_version": "7.2.30-1build1"
        },
        {
            "binary_name": "libipe7.2.30",
            "binary_version": "7.2.30-1build1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30775.json"