openSUSE Security Update: Security update for podofo ______________________________________________________________________________ Announcement ID: openSUSE-SU-2019:0066-1 Rating: important References: #1023067 #1023069 #1023070 #1023071 #1023380 #1027778 #1027779 #1027782 #1027787 #1032017 #1032018 #1032019 #1035534 #1035596 #1037739 #1075021 #1075026 #1075322 #1075772 #1084894 Cross-References: CVE-2017-5852 CVE-2017-5853 CVE-2017-5854 CVE-2017-5855 CVE-2017-5886 CVE-2017-6840 CVE-2017-6844 CVE-2017-6845 CVE-2017-6847 CVE-2017-7378 CVE-2017-7379 CVE-2017-7380 CVE-2017-7994 CVE-2017-8054 CVE-2017-8787 CVE-2018-5295 CVE-2018-5296 CVE-2018-5308 CVE-2018-5309 CVE-2018-8001 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that fixes 20 vulnerabilities is now available. Description: This update for podofo version 0.9.6 fixes the following issues: Security issues fixed: - CVE-2017-5852: Fix a infinite loop in PoDoFo::PdfPage::GetInheritedKeyFromObject (PdfPage.cpp) (boo#1023067) - CVE-2017-5854: Fix a NULL pointer dereference in PdfOutputStream.cpp (boo#1023070) - CVE-2017-5886: Fix a heap-based buffer overflow in PoDoFo::PdfTokenizer::GetNextToken (PdfTokenizer.cpp) (boo#1023380) - CVE-2017-6844: Fix a buffer overflow in PoDoFo::PdfParser::ReadXRefSubsection (PdfParser.cpp) (boo#1027782) - CVE-2017-6847: Fix a NULL pointer dereference in PoDoFo::PdfVariant::DelayedLoad (PdfVariant.h) (boo#1027778) - CVE-2017-7379: Fix a heap-based buffer overflow in PoDoFo::PdfSimpleEncoding::ConvertToEncoding (PdfEncoding.cpp) (boo#1032018) - CVE-2018-5296: Fix a denial of service in the ReadXRefSubsection function (boo#1075021) - CVE-2018-5309: Fix a integer overflow in the ReadObjectsFromStream function (boo#1075322) - CVE-2017-5853: Fix a signed integer overflow in PdfParser.cpp (boo#1023069) - CVE-2017-5855: Fix a NULL pointer dereference in the ReadXRefSubsection function (boo#1023071) - CVE-2017-6840: Fix a invalid memory read in the GetColorFromStack function (boo#1027787) - CVE-2017-6845: Fix a NULL pointer dereference in the SetNonStrokingColorSpace function (boo#1027779) - CVE-2017-7378: Fix a heap-based buffer overflow in the ExpandTabs function (boo#1032017) - CVE-2017-7380: Fix four null pointer dereferences (boo#1032019) - CVE-2017-8054: Fix a denial of service in the GetPageNodeFromArray function (boo#1035596) - CVE-2018-5295: Fix a integer overflow in the ParseStream function (boo#1075026) - CVE-2018-5308: Fix undefined behavior in the PdfMemoryOutputStream::Write function (boo#1075772) - CVE-2018-8001: Fix a heap overflow read vulnerability in the UnescapeName function (boo#1084894) - CVE-2017-7994, CVE-2017-8787: Fix a denial of service via a crafted PDF document (boo#1035534, boo#1037739) Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2019-66=1 Package List: - openSUSE Leap 42.3 (i586 x86_64): libpodofo-devel-0.9.6-10.3.1 libpodofo0_9_6-0.9.6-10.3.1 libpodofo0_9_6-debuginfo-0.9.6-10.3.1 podofo-0.9.6-10.3.1 podofo-debuginfo-0.9.6-10.3.1 podofo-debugsource-0.9.6-10.3.1 References: https://www.suse.com/security/cve/CVE-2017-5852.html https://www.suse.com/security/cve/CVE-2017-5853.html https://www.suse.com/security/cve/CVE-2017-5854.html https://www.suse.com/security/cve/CVE-2017-5855.html https://www.suse.com/security/cve/CVE-2017-5886.html https://www.suse.com/security/cve/CVE-2017-6840.html https://www.suse.com/security/cve/CVE-2017-6844.html https://www.suse.com/security/cve/CVE-2017-6845.html https://www.suse.com/security/cve/CVE-2017-6847.html https://www.suse.com/security/cve/CVE-2017-7378.html https://www.suse.com/security/cve/CVE-2017-7379.html https://www.suse.com/security/cve/CVE-2017-7380.html https://www.suse.com/security/cve/CVE-2017-7994.html https://www.suse.com/security/cve/CVE-2017-8054.html https://www.suse.com/security/cve/CVE-2017-8787.html https://www.suse.com/security/cve/CVE-2018-5295.html https://www.suse.com/security/cve/CVE-2018-5296.html https://www.suse.com/security/cve/CVE-2018-5308.html https://www.suse.com/security/cve/CVE-2018-5309.html https://www.suse.com/security/cve/CVE-2018-8001.html https://bugzilla.suse.com/1023067 https://bugzilla.suse.com/1023069 https://bugzilla.suse.com/1023070 https://bugzilla.suse.com/1023071 https://bugzilla.suse.com/1023380 https://bugzilla.suse.com/1027778 https://bugzilla.suse.com/1027779 https://bugzilla.suse.com/1027782 https://bugzilla.suse.com/1027787 https://bugzilla.suse.com/1032017 https://bugzilla.suse.com/1032018 https://bugzilla.suse.com/1032019 https://bugzilla.suse.com/1035534 https://bugzilla.suse.com/1035596 https://bugzilla.suse.com/1037739 https://bugzilla.suse.com/1075021 https://bugzilla.suse.com/1075026 https://bugzilla.suse.com/1075322 https://bugzilla.suse.com/1075772 https://bugzilla.suse.com/1084894 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org