Package : poppler Version : 0.26.5-2+deb8u6 CVE ID : CVE-2018-16646 A regression issue has been resolved in the poppler PDF rendering shared library introduced with version 0.26.5-2+deb8u5. CVE-2018-16646 In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may cause infinite recursion via a crafted file. A remote attacker can leverage this for a DoS attack. The previous solution in Debian LTS fixed the above issue in XRef.cc, the patches had been obtained from a merge request (#67) on upstream's Git development platform. Unfortunately, this merge request was declined by upstream and another merge request (#91) got applied instead. The fix now directly occurs in the Parser.cc file. This version of poppler now ships the changeset that got favorized by the poppler upstream developers (MR #91) and drops the patches from MR #67. For Debian 8 "Jessie", this problem has been fixed in version 0.26.5-2+deb8u6. We recommend that you upgrade your poppler packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -- mike gabriel aka sunweaver (Debian Developer) fon: +49 (1520) 1976 148 GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31 mail: sunweaver@debian.org, http://sunweavers.net
Attachment:
signature.asc
Description: PGP signature