OESA-2025-2484

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2484
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2484.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2484
Upstream
Published
2025-10-17T14:56:25Z
Modified
2025-10-17T15:32:49.445651Z
Summary
poppler security update
Details

is a PDF rendering library.

Security Fix(es):

Poppler 24.06.1 through 25.x before 25.04.0 allows stack consumption and a SIGSEGV via deeply nested structures within the metadata (such as GTSPDFEVersion) of a PDF document, e.g., a regular expression for a long pdfsubver string. This occurs in Dict::lookup, Catalog::getMetadata, and associated functions in PDFDoc, with deep recursion in the regex executor (std::detail::Executor).(CVE-2025-43718)

Poppler is a library for rendering PDF files, and examining or modifying their structure. A use-after-free (write) vulnerability has been detected in versions Poppler prior to 25.10.0 within the StructTreeRoot class. The issue arises from the use of raw pointers to elements of a std::vector, which can lead to dangling pointers when the vector is resized. The vulnerability stems from the way that refToParentMap stores references to std::vector elements using raw pointers. These pointers may become invalid when the vector is resized. This vulnerability is a common security problem involving the use of raw pointers to std::vectors. Internally, std::vector stores its elements in a dynamically allocated array. When the array reaches its capacity and a new element is added, the vector reallocates a larger block of memory and moves all the existing elements to the new location. At this point if any pointers to elements are stored before a resize occurs, they become dangling pointers once the reallocation happens. Version 25.10.0 contains a patch for the issue.(CVE-2025-52885)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:22.03-LTS-SP3 / poppler

Package

Name
poppler
Purl
pkg:rpm/openEuler/poppler&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.90.0-15.oe2203sp3

Ecosystem specific

{
    "aarch64": [
        "poppler-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-cpp-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-cpp-devel-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-debuginfo-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-debugsource-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-devel-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-glib-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-glib-devel-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-qt5-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-qt5-devel-0.90.0-15.oe2203sp3.aarch64.rpm",
        "poppler-utils-0.90.0-15.oe2203sp3.aarch64.rpm"
    ],
    "src": [
        "poppler-0.90.0-15.oe2203sp3.src.rpm"
    ],
    "x86_64": [
        "poppler-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-cpp-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-cpp-devel-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-debuginfo-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-debugsource-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-devel-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-glib-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-glib-devel-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-qt5-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-qt5-devel-0.90.0-15.oe2203sp3.x86_64.rpm",
        "poppler-utils-0.90.0-15.oe2203sp3.x86_64.rpm"
    ],
    "noarch": [
        "poppler-glib-doc-0.90.0-15.oe2203sp3.noarch.rpm",
        "poppler-help-0.90.0-15.oe2203sp3.noarch.rpm"
    ]
}