Debian dla-4141 : gir1.2-poppler-0.18 - security update

medium Nessus Plugin ID 236774

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4141 advisory.

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4141-1 [email protected] https://www.debian.org/lts/security/ Adrian Bunk April 28, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : poppler Version : 20.09.0-3.1+deb11u2 CVE ID : CVE-2020-36023 CVE-2020-36024 CVE-2022-37050 CVE-2022-37051 CVE-2022-37052 CVE-2022-38349 CVE-2024-56378 CVE-2025-32364 CVE-2025-32365 Debian Bug : 1091322 1102190 1102191

Multiple vulnerabilities have been fixed in the PDF rendering library poppler.

CVE-2020-36023

Infinite loop in FoFiType1C::cvtGlyph

CVE-2020-36024

NULL dereference in FoFiType1C::convertToType1

CVE-2022-37050

Crash in PDFDoc::savePageAs

CVE-2022-37051

Crash in the pdfunite tool

CVE-2022-37052

Reachable assert on XRef::add failure

CVE-2022-38349

pdfunite crash on broken files

CVE-2024-56378

Out-of-bounds read in JBIG2Bitmap::combine

CVE-2025-32364

Floating point exception in PSStack::roll

CVE-2025-32365

Out-of-bounds read in JBIG2:Bitmap::combine

For Debian 11 bullseye, these problems have been fixed in version 20.09.0-3.1+deb11u2.

We recommend that you upgrade your poppler packages.

For the detailed security status of poppler please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/poppler

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the gir1.2-poppler-0.18 packages.

See Also

https://security-tracker.debian.org/tracker/source-package/poppler

https://security-tracker.debian.org/tracker/CVE-2020-36023

https://security-tracker.debian.org/tracker/CVE-2020-36024

https://security-tracker.debian.org/tracker/CVE-2022-37050

https://security-tracker.debian.org/tracker/CVE-2022-37051

https://security-tracker.debian.org/tracker/CVE-2022-37052

https://security-tracker.debian.org/tracker/CVE-2022-38349

https://security-tracker.debian.org/tracker/CVE-2024-56378

https://security-tracker.debian.org/tracker/CVE-2025-32364

https://security-tracker.debian.org/tracker/CVE-2025-32365

https://packages.debian.org/source/bullseye/poppler

Plugin Details

Severity: Medium

ID: 236774

File Name: debian_DLA-4141.nasl

Version: 1.1

Type: local

Agent: unix

Published: 5/15/2025

Updated: 5/15/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2022-38349

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:libpoppler102, p-cpe:/a:debian:debian_linux:libpoppler-private-dev, p-cpe:/a:debian:debian_linux:libpoppler-qt5-dev, p-cpe:/a:debian:debian_linux:libpoppler-glib-dev, p-cpe:/a:debian:debian_linux:poppler-utils, p-cpe:/a:debian:debian_linux:libpoppler-cpp-dev, p-cpe:/a:debian:debian_linux:libpoppler-glib-doc, p-cpe:/a:debian:debian_linux:libpoppler-qt5-1, p-cpe:/a:debian:debian_linux:libpoppler-dev, p-cpe:/a:debian:debian_linux:libpoppler-cpp0v5, p-cpe:/a:debian:debian_linux:gir1.2-poppler-0.18, p-cpe:/a:debian:debian_linux:libpoppler-glib8

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/28/2025

Vulnerability Publication Date: 11/17/2022

Reference Information

CVE: CVE-2020-36023, CVE-2020-36024, CVE-2022-37050, CVE-2022-37051, CVE-2022-37052, CVE-2022-38349, CVE-2024-56378, CVE-2025-32364, CVE-2025-32365