Debian DLA-1562-3 : poppler regression update
Medium Nessus Plugin ID 118578
SynopsisThe remote Debian host is missing a security update.
DescriptionA second regression issue has been resolved in the poppler PDF rendering shared library this time introduced with version 0.26.5-2+deb8u6 (see DLA 1562-2).
In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may cause infinite recursion via a crafted file. A remote attacker can leverage this for a DoS attack.
The poppler upstream developers added two more regression fixes on top of the original fix (upstream merge request #91). These two patches have now been added to the poppler package in Debian jessie LTS.
For Debian 8 'Jessie', this problem has been fixed in version 0.26.5-2+deb8u7.
We recommend that you upgrade your poppler packages.
NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpgrade the affected packages.