Debian Security Advisory
DLA-1562-2 poppler -- LTS security update
- Date Reported:
- 30 Nov 2018
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-16646.
- More information:
A regression issue has been resolved in the poppler PDF rendering shared library introduced with version 0.26.5-2+deb8u5.
In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may cause infinite recursion via a crafted file. A remote attacker can leverage this for a DoS attack.
The previous solution in Debian LTS fixed the above issue in XRef.cc, the patches had been obtained from a merge request (#67) on upstream's Git development platform. Unfortunately, this merge request was declined by upstream and another merge request (#91) got applied instead. The fix now directly occurs in the Parser.cc file.
This version of poppler now ships the changeset that got favorized by the poppler upstream developers (MR #91) and drops the patches from MR #67.
For Debian 8
Jessie, this problem has been fixed in version 0.26.5-2+deb8u6.
We recommend that you upgrade your poppler packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS