Debian DLA-1562-3 : poppler regression update
Medium Nessus Plugin ID 118578
SynopsisThe remote Debian host is missing a security update.
DescriptionA second regression issue has been resolved in the poppler PDF
rendering shared library this time introduced with version
0.26.5-2+deb8u6 (see DLA 1562-2).
In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may
cause infinite recursion via a crafted file. A remote attacker can
leverage this for a DoS attack.
The poppler upstream developers added two more regression
fixes on top of the original fix (upstream merge request
#91). These two patches have now been added to the poppler
package in Debian jessie LTS.
For Debian 8 'Jessie', this problem has been fixed in version
We recommend that you upgrade your poppler packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues.
SolutionUpgrade the affected packages.