openSUSE Security Update: Security update for podofo
______________________________________________________________________________
Announcement ID:    openSUSE-SU-2019:0066-1
Rating:             important
References:         #1023067 #1023069 #1023070 #1023071 #1023380 
                    #1027778 #1027779 #1027782 #1027787 #1032017 
                    #1032018 #1032019 #1035534 #1035596 #1037739 
                    #1075021 #1075026 #1075322 #1075772 #1084894 
Cross-References:   CVE-2017-5852 CVE-2017-5853 CVE-2017-5854
                    CVE-2017-5855 CVE-2017-5886 CVE-2017-6840
                    CVE-2017-6844 CVE-2017-6845 CVE-2017-6847
                    CVE-2017-7378 CVE-2017-7379 CVE-2017-7380
                    CVE-2017-7994 CVE-2017-8054 CVE-2017-8787
                    CVE-2018-5295 CVE-2018-5296 CVE-2018-5308
                    CVE-2018-5309 CVE-2018-8001
Affected Products:
                    openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes 20 vulnerabilities is now available.
Description:
This update for podofo version 0.9.6 fixes the following issues:
Security issues fixed:
   – CVE-2017-5852: Fix a infinite loop in
     PoDoFo::PdfPage::GetInheritedKeyFromObject (PdfPage.cpp) (boo#1023067)
   – CVE-2017-5854: Fix a NULL pointer dereference in PdfOutputStream.cpp
     (boo#1023070)
   – CVE-2017-5886: Fix a heap-based buffer overflow in
     PoDoFo::PdfTokenizer::GetNextToken (PdfTokenizer.cpp) (boo#1023380)
   – CVE-2017-6844: Fix a buffer overflow in
     PoDoFo::PdfParser::ReadXRefSubsection (PdfParser.cpp) (boo#1027782)
   – CVE-2017-6847: Fix a NULL pointer dereference in
     PoDoFo::PdfVariant::DelayedLoad (PdfVariant.h) (boo#1027778)
   – CVE-2017-7379: Fix a heap-based buffer overflow in
     PoDoFo::PdfSimpleEncoding::ConvertToEncoding (PdfEncoding.cpp)
     (boo#1032018)
   – CVE-2018-5296: Fix a denial of service in the ReadXRefSubsection
     function (boo#1075021)
   – CVE-2018-5309: Fix a integer overflow in the ReadObjectsFromStream
     function (boo#1075322)
   – CVE-2017-5853: Fix a signed integer overflow in PdfParser.cpp
     (boo#1023069)
   – CVE-2017-5855: Fix a NULL pointer dereference in the ReadXRefSubsection
     function (boo#1023071)
   – CVE-2017-6840: Fix a invalid memory read in the GetColorFromStack
     function (boo#1027787)
   – CVE-2017-6845: Fix a NULL pointer dereference in the
     SetNonStrokingColorSpace function (boo#1027779)
   – CVE-2017-7378: Fix a heap-based buffer overflow in the ExpandTabs
     function (boo#1032017)
   – CVE-2017-7380: Fix four null pointer dereferences (boo#1032019)
   – CVE-2017-8054: Fix a denial of service in the GetPageNodeFromArray
     function (boo#1035596)
   – CVE-2018-5295: Fix a integer overflow in the ParseStream function
     (boo#1075026)
   – CVE-2018-5308: Fix undefined behavior in the
     PdfMemoryOutputStream::Write function (boo#1075772)
   – CVE-2018-8001: Fix a heap overflow read vulnerability in the
     UnescapeName function (boo#1084894)
   – CVE-2017-7994, CVE-2017-8787: Fix a denial of service via a crafted PDF
     document (boo#1035534, boo#1037739)
Patch Instructions:
   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-66=1
Package List:
– openSUSE Leap 42.3 (i586 x86_64):
      libpodofo-devel-0.9.6-10.3.1
      libpodofo0_9_6-0.9.6-10.3.1
      libpodofo0_9_6-debuginfo-0.9.6-10.3.1
      podofo-0.9.6-10.3.1
      podofo-debuginfo-0.9.6-10.3.1
      podofo-debugsource-0.9.6-10.3.1
References:
   https://www.suse.com/security/cve/CVE-2017-5852.html
   https://www.suse.com/security/cve/CVE-2017-5853.html
   https://www.suse.com/security/cve/CVE-2017-5854.html
   https://www.suse.com/security/cve/CVE-2017-5855.html
   https://www.suse.com/security/cve/CVE-2017-5886.html
   https://www.suse.com/security/cve/CVE-2017-6840.html
   https://www.suse.com/security/cve/CVE-2017-6844.html
   https://www.suse.com/security/cve/CVE-2017-6845.html
   https://www.suse.com/security/cve/CVE-2017-6847.html
   https://www.suse.com/security/cve/CVE-2017-7378.html
   https://www.suse.com/security/cve/CVE-2017-7379.html
   https://www.suse.com/security/cve/CVE-2017-7380.html
   https://www.suse.com/security/cve/CVE-2017-7994.html
   https://www.suse.com/security/cve/CVE-2017-8054.html
   https://www.suse.com/security/cve/CVE-2017-8787.html
   https://www.suse.com/security/cve/CVE-2018-5295.html
   https://www.suse.com/security/cve/CVE-2018-5296.html
   https://www.suse.com/security/cve/CVE-2018-5308.html
   https://www.suse.com/security/cve/CVE-2018-5309.html
   https://www.suse.com/security/cve/CVE-2018-8001.html
   https://bugzilla.suse.com/1023067
   https://bugzilla.suse.com/1023069
   https://bugzilla.suse.com/1023070
   https://bugzilla.suse.com/1023071
   https://bugzilla.suse.com/1023380
   https://bugzilla.suse.com/1027778
   https://bugzilla.suse.com/1027779
   https://bugzilla.suse.com/1027782
   https://bugzilla.suse.com/1027787
   https://bugzilla.suse.com/1032017
   https://bugzilla.suse.com/1032018
   https://bugzilla.suse.com/1032019
   https://bugzilla.suse.com/1035534
   https://bugzilla.suse.com/1035596
   https://bugzilla.suse.com/1037739
   https://bugzilla.suse.com/1075021
   https://bugzilla.suse.com/1075026
   https://bugzilla.suse.com/1075322
   https://bugzilla.suse.com/1075772
   https://bugzilla.suse.com/1084894
— 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org



