OESA-2023-1611

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1611
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1611.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1611
Upstream
Published
2023-09-09T11:05:52Z
Modified
2025-08-12T05:05:43.433240Z
Summary
poppler security update
Details

Poppler is a free software utility library for rendering Portable Document Format (PDF) documents. \ Its development is supported by freedesktop.org. It is commonly used on Linux systems,and is used by \ the PDF viewers of the open source GNOME and KDE desktop environments.

Security Fix(es):

Uncontrolled Recursion in pdfinfo, and pdftops in poppler 0.89.0 allows remote attackers to cause a denial of service via crafted input.(CVE-2020-23804)

In Poppler 22.07.0, PDFDoc::savePageAs in PDFDoc.c callows attackers to cause a denial-of-service (application crashes with SIGABRT) by crafting a PDF file in which the xref data structure is mishandled in getCatalog processing. Note that this vulnerability is caused by the incomplete patch of CVE-2018-20662.(CVE-2022-37050)

An issue was discovered in Poppler 22.07.0. There is a reachable abort which leads to denial of service because the main function in pdfunite.cc lacks a stream check before saving an embedded file.(CVE-2022-37051)

A reachable Object::getString assertion in Poppler 22.07.0 allows attackers to cause a denial of service due to a failure in markObject.(CVE-2022-37052)

An issue was discovered in Poppler 22.08.0. There is a reachable assertion in Object.h, will lead to denial of service because PDFDoc::replacePageDict in PDFDoc.cc lacks a stream check before saving an embedded file.(CVE-2022-38349)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP2 / poppler

Package

Name
poppler
Purl
pkg:rpm/openEuler/poppler&distro=openEuler-22.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.90.0-6.oe2203sp2

Ecosystem specific

{
    "aarch64": [
        "poppler-qt5-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-cpp-devel-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-utils-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-devel-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-debugsource-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-cpp-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-debuginfo-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-glib-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-glib-devel-0.90.0-6.oe2203sp2.aarch64.rpm",
        "poppler-qt5-devel-0.90.0-6.oe2203sp2.aarch64.rpm"
    ],
    "noarch": [
        "poppler-glib-doc-0.90.0-6.oe2203sp2.noarch.rpm",
        "poppler-help-0.90.0-6.oe2203sp2.noarch.rpm"
    ],
    "x86_64": [
        "poppler-glib-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-glib-devel-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-cpp-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-qt5-devel-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-debuginfo-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-devel-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-utils-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-cpp-devel-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-debugsource-0.90.0-6.oe2203sp2.x86_64.rpm",
        "poppler-qt5-0.90.0-6.oe2203sp2.x86_64.rpm"
    ],
    "src": [
        "poppler-0.90.0-6.oe2203sp2.src.rpm"
    ]
}