2024-06-28 13:17:52 +00:00

249 lines
11 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20211684",
"Version": "oval:org.altlinux.errata:def:20211684",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-1684: package `podofo` update to version 0.9.7-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-1684",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1684",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02839",
"RefURL": "https://bdu.fstec.ru/vul/2019-02839",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01664",
"RefURL": "https://bdu.fstec.ru/vul/2022-01664",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01797",
"RefURL": "https://bdu.fstec.ru/vul/2022-01797",
"Source": "BDU"
},
{
"RefID": "CVE-2018-19532",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19532",
"Source": "CVE"
},
{
"RefID": "CVE-2018-20751",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20751",
"Source": "CVE"
},
{
"RefID": "CVE-2018-20797",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20797",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10723",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10723",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20093",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20093",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9199",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9199",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9687",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9687",
"Source": "CVE"
},
{
"RefID": "CVE-2020-18971",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-18971",
"Source": "CVE"
},
{
"RefID": "CVE-2020-18972",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-18972",
"Source": "CVE"
}
],
"Description": "This update upgrades podofo to version 0.9.7-alt1. \nSecurity Fix(es):\n\n * BDU:2019-02839: Уязвимость функции crop_page() программной библиотеки PoDoFo, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01664: Уязвимость функции IsNextToken компонента src/base/PdfToenizer.cpp программной библиотеки для работы с PDF PoDoFo, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-01797: Уязвимость компонента src/base/PdfDictionary.cpp программной библиотеки для работы с PDF PoDoFo, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-19532: A NULL pointer dereference vulnerability exists in the function PdfTranslator::setTarget() in pdftranslator.cpp of PoDoFo 0.9.6, while creating the PdfXObject, as demonstrated by podofoimpose. It allows an attacker to cause Denial of Service.\n\n * CVE-2018-20751: An issue was discovered in crop_page in PoDoFo 0.9.6. For a crafted PDF document, pPage-\u003eGetObject()-\u003eGetDictionary().AddKey(PdfName(\"MediaBox\"),var) can be problematic due to the function GetObject() being called for the pPage NULL pointer object. The value of pPage at this point is 0x0, which causes a NULL pointer dereference.\n\n * CVE-2018-20797: An issue was discovered in PoDoFo 0.9.6. There is an attempted excessive memory allocation in PoDoFo::podofo_calloc in base/PdfMemoryManagement.cpp when called from PoDoFo::PdfPredictorDecoder::PdfPredictorDecoder in base/PdfFiltersPrivate.cpp.\n\n * CVE-2019-10723: An issue was discovered in PoDoFo 0.9.6. The PdfPagesTreeCache class in doc/PdfPagesTreeCache.cpp has an attempted excessive memory allocation because nInitialSize is not validated.\n\n * CVE-2019-20093: The PoDoFo::PdfVariant::DelayedLoad function in PdfVariant.h in PoDoFo 0.9.6 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file, because of ImageExtractor.cpp.\n\n * CVE-2019-9199: PoDoFo::Impose::PdfTranslator::setSource() in pdftranslator.cpp in PoDoFo 0.9.6 has a NULL pointer dereference that can (for example) be triggered by sending a crafted PDF file to the podofoimpose binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.\n\n * CVE-2019-9687: PoDoFo 0.9.6 has a heap-based buffer overflow in PdfString::ConvertUTF16toUTF8 in base/PdfString.cpp.\n\n * CVE-2020-18971: Stack-based Buffer Overflow in PoDoFo v0.9.6 allows attackers to cause a denial of service via the component 'src/base/PdfDictionary.cpp:65'.\n\n * CVE-2020-18972: Exposure of Sensitive Information to an Unauthorized Actor in PoDoFo v0.9.6 allows attackers to obtain sensitive information via 'IsNextToken' in the component 'src/base/PdfToenizer.cpp'.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-04-21"
},
"Updated": {
"Date": "2021-04-21"
},
"BDUs": [
{
"ID": "BDU:2019-02839",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-02839",
"Impact": "High",
"Public": "20181119"
},
{
"ID": "BDU:2022-01664",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-01664",
"Impact": "Low",
"Public": "20190404"
},
{
"ID": "BDU:2022-01797",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-01797",
"Impact": "Low",
"Public": "20210825"
}
],
"CVEs": [
{
"ID": "CVE-2018-19532",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19532",
"Impact": "High",
"Public": "20181126"
},
{
"ID": "CVE-2018-20751",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20751",
"Impact": "High",
"Public": "20190204"
},
{
"ID": "CVE-2018-20797",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20797",
"Impact": "Low",
"Public": "20190227"
},
{
"ID": "CVE-2019-10723",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10723",
"Impact": "Low",
"Public": "20190403"
},
{
"ID": "CVE-2019-20093",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20093",
"Impact": "Low",
"Public": "20191230"
},
{
"ID": "CVE-2019-9199",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9199",
"Impact": "High",
"Public": "20190226"
},
{
"ID": "CVE-2019-9687",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9687",
"Impact": "Critical",
"Public": "20190311"
},
{
"ID": "CVE-2020-18971",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-18971",
"Impact": "Low",
"Public": "20210825"
},
{
"ID": "CVE-2020-18972",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-18972",
"Impact": "Low",
"Public": "20210825"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20211684001",
"Comment": "libpodofo is earlier than 0:0.9.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211684002",
"Comment": "libpodofo-devel is earlier than 0:0.9.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211684003",
"Comment": "podofo is earlier than 0:0.9.7-alt1"
}
]
}
]
}
}
]
}