Source: pdfminer
Version: 20221105+dfsg-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for pdfminer.

CVE-2025-64512[0]:
| Pdfminer.six is a community maintained fork of the original
| PDFMiner, a tool for extracting information from PDF documents.
| Prior to version 20251107, pdfminer.six will execute arbitrary code
| from a malicious pickle file if provided with a malicious PDF file.
| The `CMapDB._load_data()` function in pdfminer.six uses
| `pickle.loads()` to deserialize pickle files. These pickle files are
| supposed to be part of the pdfminer.six distribution stored in the
| `cmap/` directory, but a malicious PDF can specify an alternative
| directory and filename as long as the filename ends in `.pickle.gz`.
| A malicious, zipped pickle file can then contain code which will
| automatically execute when the PDF is processed. Version 20251107
| fixes the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-64512
    https://www.cve.org/CVERecord?id=CVE-2025-64512
[1] 
https://github.com/pdfminer/pdfminer.six/security/advisories/GHSA-wf5f-4jwr-ppcp
[2] 
https://github.com/pdfminer/pdfminer.six/commit/b808ee05dd7f0c8ea8ec34bdf394d40e63501086

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to