Vulnerability Description
libpoppler.so in Poppler through 24.12.0 has an out-of-bounds read vulnerability within the JBIG2Bitmap::combine function in JBIG2Stream.cc.
CVSS Score
4.3
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freedesktop | Poppler | <= 24.12.0 |
Related Weaknesses (CWE)
References
- https://gitlab.freedesktop.org/poppler/poppler/-/blob/30eada0d2bceb42c2d2a873613Product
- https://gitlab.freedesktop.org/poppler/poppler/-/commit/ade9b5ebed44b0c15522c276Patch
- https://gitlab.freedesktop.org/poppler/poppler/-/issues/1553ExploitIssue Tracking
- https://lists.debian.org/debian-lts-announce/2025/04/msg00037.html
FAQ
What is CVE-2024-56378?
CVE-2024-56378 is a vulnerability with a CVSS score of 4.3 (MEDIUM). libpoppler.so in Poppler through 24.12.0 has an out-of-bounds read vulnerability within the JBIG2Bitmap::combine function in JBIG2Stream.cc.
How severe is CVE-2024-56378?
CVE-2024-56378 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-56378?
Check the references section above for vendor advisories and patch information. Affected products include: Freedesktop Poppler.