CVE-2025-43718

NameCVE-2025-43718
DescriptionPoppler 24.06.1 through 25.x before 25.04.0 allows stack consumption and a SIGSEGV via deeply nested structures within the metadata (such as GTS_PDFEVersion) of a PDF document, e.g., a regular expression for a long pdfsubver string. This occurs in Dict::lookup, Catalog::getMetadata, and associated functions in PDFDoc, with deep recursion in the regex executor (std::__detail::_Executor).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1117046

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
poppler (PTS)bullseye20.09.0-3.1+deb11u1vulnerable
bullseye (security)20.09.0-3.1+deb11u2vulnerable
bookworm22.12.0-2+deb12u1vulnerable
trixie25.03.0-5vulnerable
forky, sid25.03.0-11.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
popplersource(unstable)25.03.0-101117046

Notes

[trixie] - poppler <no-dsa> (Minor issue)
[bookworm] - poppler <no-dsa> (Minor issue)
[bullseye] - poppler <postponed> (minor issue)
Fixed by: https://gitlab.freedesktop.org/poppler/poppler/-/commit/f54b815672117c250420787c8c006de98e8c7408 (poppler-25.04.0)

Search for package or bug name: Reporting problems