USN-7217-1

Source
https://ubuntu.com/security/notices/USN-7217-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7217-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7217-1
Related
Published
2025-01-20T04:29:20.114113Z
Modified
2025-01-20T04:29:20.114113Z
Summary
libpodofo vulnerabilities
Details

It was discovered that the PoDoFo library could dereference a NULL pointer when getting the number of pages in a PDF. If a user or application were tricked into opening a crafted PDF file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2018-11255)

It was discovered that PoDoFo library incorrectly handled memory when computing an encryption key, which could lead to a buffer overflow. If a user or application were tricked into opening a crafted PDF file, an attacker could possibly use this issue to cause a denial of service. (CVE-2018-12983)

It was discovered that the PoDoFo library incorrectly handled memory allocation. If a user or application were tricked into opening a crafted PDF file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2018-20797)

It was discovered that the PoDoFo library did not properly validate memcpy arguments. If a user or application were tricked into opening a crafted PDF file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2018-5308)

It was discovered that the PoDoFo library incorrectly handled memory in the GetNextToken function, which could lead to a buffer overflow. If a user or application were tricked into opening a crafted PDF file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-5886)

It was discovered that the PoDoFo library could enter an infinite loop, which could lead to a stack overflow. If a user or application were tricked into opening a crafted PDF file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2018-8002, CVE-2020-18971, CVE-2021-30471, CVE-2021-30470)

It was discovered that the PoDoFo library incorrectly handled memory allocation due to nInitialSize not being validated. If a user or application were tricked into opening a crafted PDF file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-10723)

References

Affected packages

Ubuntu:Pro:14.04:LTS / libpodofo

Package

Name
libpodofo
Purl
pkg:deb/ubuntu/libpodofo@0.9.0-1.2ubuntu0.1~esm3?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.0-1.2ubuntu0.1~esm3

Affected versions

0.*

0.9.0-1.1ubuntu1
0.9.0-1.2
0.9.0-1.2ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "0.9.0-1.2ubuntu0.1~esm3",
            "binary_name": "libpodofo-dev"
        },
        {
            "binary_version": "0.9.0-1.2ubuntu0.1~esm3",
            "binary_name": "libpodofo-utils"
        },
        {
            "binary_version": "0.9.0-1.2ubuntu0.1~esm3",
            "binary_name": "libpodofo0.9.0"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / libpodofo

Package

Name
libpodofo
Purl
pkg:deb/ubuntu/libpodofo@0.9.3-4ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.3-4ubuntu0.1~esm1

Affected versions

0.*

0.9.0-1.3
0.9.3-3
0.9.3-4

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "0.9.3-4ubuntu0.1~esm1",
            "binary_name": "libpodofo-dev"
        },
        {
            "binary_version": "0.9.3-4ubuntu0.1~esm1",
            "binary_name": "libpodofo-utils"
        },
        {
            "binary_version": "0.9.3-4ubuntu0.1~esm1",
            "binary_name": "libpodofo-utils-dbgsym"
        },
        {
            "binary_version": "0.9.3-4ubuntu0.1~esm1",
            "binary_name": "libpodofo0.9.3"
        },
        {
            "binary_version": "0.9.3-4ubuntu0.1~esm1",
            "binary_name": "libpodofo0.9.3-dbgsym"
        }
    ]
}

Ubuntu:Pro:18.04:LTS / libpodofo

Package

Name
libpodofo
Purl
pkg:deb/ubuntu/libpodofo@0.9.5-9ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.5-9ubuntu0.1~esm1

Affected versions

0.*

0.9.5-6
0.9.5-8
0.9.5-8build1
0.9.5-9

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "0.9.5-9ubuntu0.1~esm1",
            "binary_name": "libpodofo-dev"
        },
        {
            "binary_version": "0.9.5-9ubuntu0.1~esm1",
            "binary_name": "libpodofo-utils"
        },
        {
            "binary_version": "0.9.5-9ubuntu0.1~esm1",
            "binary_name": "libpodofo-utils-dbgsym"
        },
        {
            "binary_version": "0.9.5-9ubuntu0.1~esm1",
            "binary_name": "libpodofo0.9.5"
        },
        {
            "binary_version": "0.9.5-9ubuntu0.1~esm1",
            "binary_name": "libpodofo0.9.5-dbgsym"
        }
    ]
}

Ubuntu:Pro:20.04:LTS / libpodofo

Package

Name
libpodofo
Purl
pkg:deb/ubuntu/libpodofo@0.9.6+dfsg-5ubuntu0.1~esm1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.6+dfsg-5ubuntu0.1~esm1

Affected versions

0.*

0.9.6+dfsg-5
0.9.6+dfsg-5build1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "0.9.6+dfsg-5ubuntu0.1~esm1",
            "binary_name": "libpodofo-dev"
        },
        {
            "binary_version": "0.9.6+dfsg-5ubuntu0.1~esm1",
            "binary_name": "libpodofo-utils"
        },
        {
            "binary_version": "0.9.6+dfsg-5ubuntu0.1~esm1",
            "binary_name": "libpodofo-utils-dbgsym"
        },
        {
            "binary_version": "0.9.6+dfsg-5ubuntu0.1~esm1",
            "binary_name": "libpodofo0.9.6"
        },
        {
            "binary_version": "0.9.6+dfsg-5ubuntu0.1~esm1",
            "binary_name": "libpodofo0.9.6-dbgsym"
        }
    ]
}

Ubuntu:Pro:22.04:LTS / libpodofo

Package

Name
libpodofo
Purl
pkg:deb/ubuntu/libpodofo@0.9.7+dfsg-3ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.7+dfsg-3ubuntu0.1~esm1

Affected versions

0.*

0.9.7+dfsg-2
0.9.7+dfsg-2build1
0.9.7+dfsg-2build2
0.9.7+dfsg-3

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "0.9.7+dfsg-3ubuntu0.1~esm1",
            "binary_name": "libpodofo-dev"
        },
        {
            "binary_version": "0.9.7+dfsg-3ubuntu0.1~esm1",
            "binary_name": "libpodofo-utils"
        },
        {
            "binary_version": "0.9.7+dfsg-3ubuntu0.1~esm1",
            "binary_name": "libpodofo-utils-dbgsym"
        },
        {
            "binary_version": "0.9.7+dfsg-3ubuntu0.1~esm1",
            "binary_name": "libpodofo0.9.7"
        },
        {
            "binary_version": "0.9.7+dfsg-3ubuntu0.1~esm1",
            "binary_name": "libpodofo0.9.7-dbgsym"
        }
    ]
}