OESA-2025-2481

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2481
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2481.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2481
Upstream
Published
2025-10-17T14:56:19Z
Modified
2025-10-17T15:32:48.017102Z
Summary
poppler security update
Details

is a PDF rendering library.

Security Fix(es):

Poppler 24.06.1 through 25.x before 25.04.0 allows stack consumption and a SIGSEGV via deeply nested structures within the metadata (such as GTSPDFEVersion) of a PDF document, e.g., a regular expression for a long pdfsubver string. This occurs in Dict::lookup, Catalog::getMetadata, and associated functions in PDFDoc, with deep recursion in the regex executor (std::detail::Executor).(CVE-2025-43718)

Poppler is a library for rendering PDF files, and examining or modifying their structure. A use-after-free (write) vulnerability has been detected in versions Poppler prior to 25.10.0 within the StructTreeRoot class. The issue arises from the use of raw pointers to elements of a std::vector, which can lead to dangling pointers when the vector is resized. The vulnerability stems from the way that refToParentMap stores references to std::vector elements using raw pointers. These pointers may become invalid when the vector is resized. This vulnerability is a common security problem involving the use of raw pointers to std::vectors. Internally, std::vector stores its elements in a dynamically allocated array. When the array reaches its capacity and a new element is added, the vector reallocates a larger block of memory and moves all the existing elements to the new location. At this point if any pointers to elements are stored before a resize occurs, they become dangling pointers once the reallocation happens. Version 25.10.0 contains a patch for the issue.(CVE-2025-52885)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / poppler

Package

Name
poppler
Purl
pkg:rpm/openEuler/poppler&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
23.12.0-13.oe2403sp1

Ecosystem specific

{
    "aarch64": [
        "poppler-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-cpp-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-cpp-devel-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-debuginfo-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-debugsource-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-devel-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-glib-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-glib-devel-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-qt5-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-qt5-devel-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-qt6-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-qt6-devel-23.12.0-13.oe2403sp1.aarch64.rpm",
        "poppler-utils-23.12.0-13.oe2403sp1.aarch64.rpm"
    ],
    "src": [
        "poppler-23.12.0-13.oe2403sp1.src.rpm"
    ],
    "x86_64": [
        "poppler-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-cpp-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-cpp-devel-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-debuginfo-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-debugsource-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-devel-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-glib-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-glib-devel-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-qt5-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-qt5-devel-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-qt6-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-qt6-devel-23.12.0-13.oe2403sp1.x86_64.rpm",
        "poppler-utils-23.12.0-13.oe2403sp1.x86_64.rpm"
    ],
    "noarch": [
        "poppler-glib-doc-23.12.0-13.oe2403sp1.noarch.rpm",
        "poppler-help-23.12.0-13.oe2403sp1.noarch.rpm"
    ]
}