Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.0483 SUSE Security Update: Security update for podofo 15 February 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: podofo Publisher: SUSE Operating System: SUSE Impact/Access: Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-11256 CVE-2018-5783 CVE-2018-5309 CVE-2018-5308 CVE-2018-5296 CVE-2018-5295 CVE-2017-8054 CVE-2017-7383 CVE-2017-7382 CVE-2017-7381 CVE-2017-6845 Reference: ESB-2018.2503 Original Bulletin: https://www.suse.com/support/update/announcement/2019/suse-su-20190393-1.html - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for podofo ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:0393-1 Rating: moderate References: #1027779 #1032020 #1032021 #1032022 #1075021 #1075026 #1075322 #1075772 #1076962 #1096889 #1096890 Cross-References: CVE-2017-6845 CVE-2017-7381 CVE-2017-7382 CVE-2017-7383 CVE-2017-8054 CVE-2018-11256 CVE-2018-5295 CVE-2018-5296 CVE-2018-5308 CVE-2018-5309 CVE-2018-5783 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP4 SUSE Linux Enterprise Workstation Extension 12-SP3 SUSE Linux Enterprise Software Development Kit 12-SP4 SUSE Linux Enterprise Software Development Kit 12-SP3 SUSE Linux Enterprise Desktop 12-SP4 SUSE Linux Enterprise Desktop 12-SP3 ______________________________________________________________________________ An update that fixes 11 vulnerabilities is now available. Description: This update for podofo fixes the following issues: These security issues were fixed: - CVE-2017-6845: The PoDoFo::PdfColor::operator function allowed remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file (bsc#1027779). - CVE-2018-5308: Properly validate memcpy arguments in the PdfMemoryOutputStream::Write function to prevent remote attackers from causing a denial-of-service or possibly have unspecified other impact via a crafted pdf file (bsc#1075772) - CVE-2018-5295: Prevent integer overflow in the PdfXRefStreamParserObject::ParseStream function that allowed remote attackers to cause a denial-of-service via a crafted pdf file (bsc#1075026). - CVE-2017-6845: The PoDoFo::PdfColor::operator function allowed remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file (bsc#1027779). - CVE-2018-5309: Prevent integer overflow in the PdfObjectStreamParserObject::ReadObjectsFromStream function that allowed remote attackers to cause a denial-of-service via a crafted pdf file (bsc#1075322). - CVE-2018-5296: Prevent uncontrolled memory allocation in the PdfParser::ReadXRefSubsection function that allowed remote attackers to cause a denial-of-service via a crafted pdf file (bsc#1075021). - CVE-2017-7381: Prevent NULL pointer dereference that allowed remote attackers to cause a denial of service via a crafted PDF document (bsc#1032020). - CVE-2017-7382: Prevent NULL pointer dereference that allowed remote attackers to cause a denial of service via a crafted PDF document (bsc#1032021). - CVE-2017-7383: Prevent NULL pointer dereference that allowed remote attackers to cause a denial of service via a crafted PDF document (bsc#1032022). - CVE-2018-11256: Prevent NULL pointer dereference that allowed remote attackers to cause a denial of service via a crafted PDF document (bsc#1096889). - CVE-2018-5783: Prevent uncontrolled memory allocation in the PoDoFo::PdfVecObjects::Reserve function that allowed remote attackers to cause a denial of service via a crafted pdf file (bsc#1076962). These non-security issues were fixed: - Prevent regression caused by the fix for CVE-2017-8054. - Prevent NULL dereferences when "Kids" array is missing (bsc#1096890) - Added to detect cycles and recursions in XRef tables Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP4: zypper in -t patch SUSE-SLE-WE-12-SP4-2019-393=1 - SUSE Linux Enterprise Workstation Extension 12-SP3: zypper in -t patch SUSE-SLE-WE-12-SP3-2019-393=1 - SUSE Linux Enterprise Software Development Kit 12-SP4: zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-393=1 - SUSE Linux Enterprise Software Development Kit 12-SP3: zypper in -t patch SUSE-SLE-SDK-12-SP3-2019-393=1 - SUSE Linux Enterprise Desktop 12-SP4: zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-393=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-393=1 Package List: - SUSE Linux Enterprise Workstation Extension 12-SP4 (x86_64): libpodofo0_9_2-0.9.2-3.6.3 libpodofo0_9_2-debuginfo-0.9.2-3.6.3 podofo-debuginfo-0.9.2-3.6.3 podofo-debugsource-0.9.2-3.6.3 - SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64): libpodofo0_9_2-0.9.2-3.6.3 libpodofo0_9_2-debuginfo-0.9.2-3.6.3 podofo-debuginfo-0.9.2-3.6.3 podofo-debugsource-0.9.2-3.6.3 - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64): libpodofo-devel-0.9.2-3.6.3 podofo-debuginfo-0.9.2-3.6.3 podofo-debugsource-0.9.2-3.6.3 - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64): libpodofo-devel-0.9.2-3.6.3 podofo-debuginfo-0.9.2-3.6.3 podofo-debugsource-0.9.2-3.6.3 - SUSE Linux Enterprise Desktop 12-SP4 (x86_64): libpodofo0_9_2-0.9.2-3.6.3 libpodofo0_9_2-debuginfo-0.9.2-3.6.3 podofo-debuginfo-0.9.2-3.6.3 podofo-debugsource-0.9.2-3.6.3 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): libpodofo0_9_2-0.9.2-3.6.3 libpodofo0_9_2-debuginfo-0.9.2-3.6.3 podofo-debuginfo-0.9.2-3.6.3 podofo-debugsource-0.9.2-3.6.3 References: https://www.suse.com/security/cve/CVE-2017-6845.html https://www.suse.com/security/cve/CVE-2017-7381.html https://www.suse.com/security/cve/CVE-2017-7382.html https://www.suse.com/security/cve/CVE-2017-7383.html https://www.suse.com/security/cve/CVE-2017-8054.html https://www.suse.com/security/cve/CVE-2018-11256.html https://www.suse.com/security/cve/CVE-2018-5295.html https://www.suse.com/security/cve/CVE-2018-5296.html https://www.suse.com/security/cve/CVE-2018-5308.html https://www.suse.com/security/cve/CVE-2018-5309.html https://www.suse.com/security/cve/CVE-2018-5783.html https://bugzilla.suse.com/1027779 https://bugzilla.suse.com/1032020 https://bugzilla.suse.com/1032021 https://bugzilla.suse.com/1032022 https://bugzilla.suse.com/1075021 https://bugzilla.suse.com/1075026 https://bugzilla.suse.com/1075322 https://bugzilla.suse.com/1075772 https://bugzilla.suse.com/1076962 https://bugzilla.suse.com/1096889 https://bugzilla.suse.com/1096890 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXGYQAmaOgq3Tt24GAQh3rhAAmc13tzkAZExz3n0nM9R0+O5jwhi8JqHe qwlNYObFoleM3vUa9U8GDH4ZUoUjV1hpfs90w/iRF3qpAt746Qr/OwgAy6D7w4rm 2WMxgHhKcW+fuCWaaVBnUK/SQHtDmHrnB2GGmJTNUp2wOJPrJNoSUZvH7R+LBRL9 Fe7rG2WXv4MgeNa9qbJoYZtm+5A2c1bLuOzlRzW6MaIAVurv83/tW7al2cj6wsWo NnhB6Gj21eby4solQ5A/Avy9Z12+2h2GbLXzbSYo7v191lMMk5xAcmvh/4mbhwiA EOyaVp0EVbOrNhsGn05OZYqjkyFm+1sFaJVVybjNyqeh00QvDrPta6kYyChw338U ZcWJqs2au5ogb/mYn41wKNdo7o3KqNhDMJDUNyrqHJ5Ifluio40ZRysHrOkGqcEd vMlGPmovZXpQqDdGZShtlpUerBSRxfDE1YoyLyF8R6WKesdkhNlIIDg1+TWDWAQn zfH9mn4340Bt/ydI+LSJ/o34AAm5ctHYRtw3VG6PuAKhAK0jZ9pQEUIihd3LLDM+ jDytc3c2ITnLD8H77yyVc6GPPWjpm2/KSnT994Dk2k59Vo4JjQslMhNfLHfa5UAQ nxNk6gXFc++WbB4ujAXKB5KorGda67WLWYz1xG6wggGdf3dHTjxHHsqXNBglZOc3 o4mhggfPhaw= =YPoR -----END PGP SIGNATURE-----