Debian Bug report logs -
#1035935
libpodofo: CVE-2023-31555 CVE-2023-31556 CVE-2023-31568
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, team@security.debian.org, Mattia Rizzolo <mattia@debian.org>
:
Bug#1035935
; Package src:libpodofo
.
(Thu, 11 May 2023 12:12:25 GMT) (full text, mbox, link).
Acknowledgement sent
to Moritz Mühlenhoff <jmm@inutil.org>
:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Mattia Rizzolo <mattia@debian.org>
.
(Thu, 11 May 2023 12:12:25 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: libpodofo
X-Debbugs-CC: team@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerabilities were published for libpodofo.
CVE-2023-31555[0]:
| podofoinfo 0.10.0 was discovered to contain a segmentation violation
| via the function PoDoFo::PdfObject::DelayedLoad.
https://github.com/podofo/podofo/issues/67
https://github.com/podofo/podofo/commit/3759eb6aae7c01f2d8670f16ac46f5e116c7f468
CVE-2023-31556[1]:
| podofoinfo 0.10.0 was discovered to contain a segmentation violation
| via the function PoDoFo::PdfDictionary::findKeyParent.
https://github.com/podofo/podofo/issues/66
https://github.com/podofo/podofo/commit/8d3e9104ea10f8b53a0b5a2a806e6388acd41a40
CVE-2023-31568[2]:
| Podofo v0.10.0 was discovered to contain a heap buffer overflow via
| the component PoDoFo::PdfEncryptRC4::PdfEncryptRC4.
https://github.com/podofo/podofo/issues/72
Fixed by: https://github.com/podofo/podofo/commit/29d59f604b37159e938a2f46acd4856cfd1e7bac
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2023-31555
https://www.cve.org/CVERecord?id=CVE-2023-31555
[1] https://security-tracker.debian.org/tracker/CVE-2023-31556
https://www.cve.org/CVERecord?id=CVE-2023-31556
[2] https://security-tracker.debian.org/tracker/CVE-2023-31568
https://www.cve.org/CVERecord?id=CVE-2023-31568
Please adjust the affected versions in the BTS as needed.
Added tag(s) upstream.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Thu, 11 May 2023 18:27:08 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Fri May 12 13:12:07 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.