USN-5026-2

Source
https://ubuntu.com/security/notices/USN-5026-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5026-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5026-2
Upstream
Related
Published
2021-08-02T14:15:25.669677Z
Modified
2025-10-13T04:35:35Z
Summary
qpdf vulnerabilities
Details

USN-5026-1 fixed several vulnerabilities in QPDF. This update provides the corresponding update for Ubuntu 16.04 ESM. Original advisory details:

It was discovered that QPDF incorrectly handled certain malformed PDF files. A remote attacker could use this issue to cause QPDF to consume resources, resulting in a denial of service. (CVE-2018-18020)

It was discovered that QPDF incorrectly handled certain malformed PDF files. A remote attacker could use this issue to cause QPDF to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-36978)

References

Affected packages

Ubuntu:Pro:16.04:LTS / qpdf

Package

Name
qpdf
Purl
pkg:deb/ubuntu/qpdf@8.0.2-3~16.04.1+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.2-3~16.04.1+esm1

Affected versions

5.*

5.1.3-2
5.1.3-3
5.2.0-1
5.2.0-2

6.*

6.0.0-2

8.*

8.0.2-3~16.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "8.0.2-3~16.04.1+esm1",
            "binary_name": "libqpdf-dev"
        },
        {
            "binary_version": "8.0.2-3~16.04.1+esm1",
            "binary_name": "libqpdf21"
        },
        {
            "binary_version": "8.0.2-3~16.04.1+esm1",
            "binary_name": "qpdf"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

{
    "cves_map": {
        "cves": [
            {
                "severity": [
                    {
                        "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "low",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2018-18020"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2021-36978"
            }
        ],
        "ecosystem": "Ubuntu:Pro:16.04:LTS"
    }
}