Debian Security Advisory

DLA-1562-2 poppler -- LTS security update

Date Reported:
30 Nov 2018
Affected Packages:
poppler
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2018-16646.
More information:

A regression issue has been resolved in the poppler PDF rendering shared library introduced with version 0.26.5-2+deb8u5.

  • CVE-2018-16646

    In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may cause infinite recursion via a crafted file. A remote attacker can leverage this for a DoS attack.

    The previous solution in Debian LTS fixed the above issue in XRef.cc, the patches had been obtained from a merge request (#67) on upstream's Git development platform. Unfortunately, this merge request was declined by upstream and another merge request (#91) got applied instead. The fix now directly occurs in the Parser.cc file.

    This version of poppler now ships the changeset that got favorized by the poppler upstream developers (MR #91) and drops the patches from MR #67.

For Debian 8 Jessie, this problem has been fixed in version 0.26.5-2+deb8u6.

We recommend that you upgrade your poppler packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS