-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.0483
             SUSE Security Update: Security update for podofo
                             15 February 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           podofo
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Denial of Service -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-11256 CVE-2018-5783 CVE-2018-5309
                   CVE-2018-5308 CVE-2018-5296 CVE-2018-5295
                   CVE-2017-8054 CVE-2017-7383 CVE-2017-7382
                   CVE-2017-7381 CVE-2017-6845 

Reference:         ESB-2018.2503

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2019/suse-su-20190393-1.html

- --------------------------BEGIN INCLUDED TEXT--------------------

   SUSE Security Update: Security update for podofo
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:0393-1
Rating:             moderate
References:         #1027779 #1032020 #1032021 #1032022 #1075021 
                    #1075026 #1075322 #1075772 #1076962 #1096889 
                    #1096890 
Cross-References:   CVE-2017-6845 CVE-2017-7381 CVE-2017-7382
                    CVE-2017-7383 CVE-2017-8054 CVE-2018-11256
                    CVE-2018-5295 CVE-2018-5296 CVE-2018-5308
                    CVE-2018-5309 CVE-2018-5783
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP4
                    SUSE Linux Enterprise Workstation Extension 12-SP3
                    SUSE Linux Enterprise Software Development Kit 12-SP4
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP4
                    SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

   An update that fixes 11 vulnerabilities is now available.

Description:

   This update for podofo fixes the following issues:

   These security issues were fixed:

   - CVE-2017-6845: The PoDoFo::PdfColor::operator function allowed remote
     attackers to cause a denial of service (NULL pointer dereference) via a
     crafted file (bsc#1027779).
   - CVE-2018-5308: Properly validate memcpy arguments in the
     PdfMemoryOutputStream::Write function to prevent remote attackers from
     causing a denial-of-service or possibly have unspecified other impact
     via a crafted pdf file (bsc#1075772)
   - CVE-2018-5295: Prevent integer overflow in the
     PdfXRefStreamParserObject::ParseStream function that allowed remote
     attackers to cause a denial-of-service via a crafted pdf file
     (bsc#1075026).
   - CVE-2017-6845: The PoDoFo::PdfColor::operator function allowed remote
     attackers to cause a denial of service (NULL pointer dereference) via a
     crafted file (bsc#1027779).
   - CVE-2018-5309: Prevent integer overflow in the
     PdfObjectStreamParserObject::ReadObjectsFromStream function that allowed
     remote attackers to cause a denial-of-service via a crafted pdf file
     (bsc#1075322).
   - CVE-2018-5296: Prevent uncontrolled memory allocation in the
     PdfParser::ReadXRefSubsection function that allowed remote attackers to
     cause a denial-of-service via a crafted pdf file (bsc#1075021).
   - CVE-2017-7381: Prevent NULL pointer dereference that allowed remote
     attackers to cause a denial of service via a crafted PDF document
     (bsc#1032020).
   - CVE-2017-7382: Prevent NULL pointer dereference that allowed remote
     attackers to cause a denial of service via a crafted PDF document
     (bsc#1032021).
   - CVE-2017-7383: Prevent NULL pointer dereference that allowed remote
     attackers to cause a denial of service via a crafted PDF document
     (bsc#1032022).
   - CVE-2018-11256: Prevent NULL pointer dereference that allowed remote
     attackers to cause a denial of service via a crafted PDF document
     (bsc#1096889).
   - CVE-2018-5783: Prevent uncontrolled memory allocation in the
     PoDoFo::PdfVecObjects::Reserve function that allowed remote attackers to
     cause a denial of service via a crafted pdf file (bsc#1076962).

   These non-security issues were fixed:

   - Prevent regression caused by the fix for CVE-2017-8054.
   - Prevent NULL dereferences when "Kids" array is missing (bsc#1096890)
   - Added to detect cycles and recursions in XRef tables


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP4:

      zypper in -t patch SUSE-SLE-WE-12-SP4-2019-393=1

   - SUSE Linux Enterprise Workstation Extension 12-SP3:

      zypper in -t patch SUSE-SLE-WE-12-SP3-2019-393=1

   - SUSE Linux Enterprise Software Development Kit 12-SP4:

      zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-393=1

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2019-393=1

   - SUSE Linux Enterprise Desktop 12-SP4:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-393=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-393=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP4 (x86_64):

      libpodofo0_9_2-0.9.2-3.6.3
      libpodofo0_9_2-debuginfo-0.9.2-3.6.3
      podofo-debuginfo-0.9.2-3.6.3
      podofo-debugsource-0.9.2-3.6.3

   - SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):

      libpodofo0_9_2-0.9.2-3.6.3
      libpodofo0_9_2-debuginfo-0.9.2-3.6.3
      podofo-debuginfo-0.9.2-3.6.3
      podofo-debugsource-0.9.2-3.6.3

   - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):

      libpodofo-devel-0.9.2-3.6.3
      podofo-debuginfo-0.9.2-3.6.3
      podofo-debugsource-0.9.2-3.6.3

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      libpodofo-devel-0.9.2-3.6.3
      podofo-debuginfo-0.9.2-3.6.3
      podofo-debugsource-0.9.2-3.6.3

   - SUSE Linux Enterprise Desktop 12-SP4 (x86_64):

      libpodofo0_9_2-0.9.2-3.6.3
      libpodofo0_9_2-debuginfo-0.9.2-3.6.3
      podofo-debuginfo-0.9.2-3.6.3
      podofo-debugsource-0.9.2-3.6.3

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      libpodofo0_9_2-0.9.2-3.6.3
      libpodofo0_9_2-debuginfo-0.9.2-3.6.3
      podofo-debuginfo-0.9.2-3.6.3
      podofo-debugsource-0.9.2-3.6.3


References:

   https://www.suse.com/security/cve/CVE-2017-6845.html
   https://www.suse.com/security/cve/CVE-2017-7381.html
   https://www.suse.com/security/cve/CVE-2017-7382.html
   https://www.suse.com/security/cve/CVE-2017-7383.html
   https://www.suse.com/security/cve/CVE-2017-8054.html
   https://www.suse.com/security/cve/CVE-2018-11256.html
   https://www.suse.com/security/cve/CVE-2018-5295.html
   https://www.suse.com/security/cve/CVE-2018-5296.html
   https://www.suse.com/security/cve/CVE-2018-5308.html
   https://www.suse.com/security/cve/CVE-2018-5309.html
   https://www.suse.com/security/cve/CVE-2018-5783.html
   https://bugzilla.suse.com/1027779
   https://bugzilla.suse.com/1032020
   https://bugzilla.suse.com/1032021
   https://bugzilla.suse.com/1032022
   https://bugzilla.suse.com/1075021
   https://bugzilla.suse.com/1075026
   https://bugzilla.suse.com/1075322
   https://bugzilla.suse.com/1075772
   https://bugzilla.suse.com/1076962
   https://bugzilla.suse.com/1096889
   https://bugzilla.suse.com/1096890

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXGYQAmaOgq3Tt24GAQh3rhAAmc13tzkAZExz3n0nM9R0+O5jwhi8JqHe
qwlNYObFoleM3vUa9U8GDH4ZUoUjV1hpfs90w/iRF3qpAt746Qr/OwgAy6D7w4rm
2WMxgHhKcW+fuCWaaVBnUK/SQHtDmHrnB2GGmJTNUp2wOJPrJNoSUZvH7R+LBRL9
Fe7rG2WXv4MgeNa9qbJoYZtm+5A2c1bLuOzlRzW6MaIAVurv83/tW7al2cj6wsWo
NnhB6Gj21eby4solQ5A/Avy9Z12+2h2GbLXzbSYo7v191lMMk5xAcmvh/4mbhwiA
EOyaVp0EVbOrNhsGn05OZYqjkyFm+1sFaJVVybjNyqeh00QvDrPta6kYyChw338U
ZcWJqs2au5ogb/mYn41wKNdo7o3KqNhDMJDUNyrqHJ5Ifluio40ZRysHrOkGqcEd
vMlGPmovZXpQqDdGZShtlpUerBSRxfDE1YoyLyF8R6WKesdkhNlIIDg1+TWDWAQn
zfH9mn4340Bt/ydI+LSJ/o34AAm5ctHYRtw3VG6PuAKhAK0jZ9pQEUIihd3LLDM+
jDytc3c2ITnLD8H77yyVc6GPPWjpm2/KSnT994Dk2k59Vo4JjQslMhNfLHfa5UAQ
nxNk6gXFc++WbB4ujAXKB5KorGda67WLWYz1xG6wggGdf3dHTjxHHsqXNBglZOc3
o4mhggfPhaw=
=YPoR
-----END PGP SIGNATURE-----