{"id":"USN-7217-1","summary":"libpodofo vulnerabilities","details":"It was discovered that the PoDoFo library could dereference a NULL pointer\nwhen getting the number of pages in a PDF. If a user or application were\ntricked into opening a crafted PDF file, an attacker could possibly use\nthis issue to cause a denial of service. This issue only affected \nUbuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.\n(CVE-2018-11255)\n\nIt was discovered that PoDoFo library incorrectly handled memory when\ncomputing an encryption key, which could lead to a buffer overflow. If a\nuser or application were tricked into opening a crafted PDF file, an\nattacker could possibly use this issue to cause a denial of service.\n(CVE-2018-12983)\n\nIt was discovered that the PoDoFo library incorrectly handled memory\nallocation. If a user or application were tricked into opening a crafted\nPDF file, an attacker could possibly use this issue to cause a denial of\nservice. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and\nUbuntu 22.04 LTS. (CVE-2018-20797)\n\nIt was discovered that the PoDoFo library did not properly validate memcpy\narguments. If a user or application were tricked into opening a crafted\nPDF file, an attacker could possibly use this issue to cause a denial of\nservice or execute arbitrary code. This issue only affected\nUbuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2018-5308)\n\nIt was discovered that the PoDoFo library incorrectly handled memory in\nthe GetNextToken function, which could lead to a buffer overflow. If a\nuser or application were tricked into opening a crafted PDF file, an\nattacker could possibly use this issue to cause a denial of service.\nThis issue only affected Ubuntu 16.04 LTS. (CVE-2017-5886)\n\nIt was discovered that the PoDoFo library could enter an infinite loop,\nwhich could lead to a stack overflow. If a user or application were\ntricked into opening a crafted PDF file, an attacker could possibly use\nthis issue to cause a denial of service or execute arbitrary code. This\nissue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.\n(CVE-2018-8002, CVE-2020-18971, CVE-2021-30471, CVE-2021-30470)\n\nIt was discovered that the PoDoFo library incorrectly handled memory\nallocation due to nInitialSize not being validated. If a user or\napplication were tricked into opening a crafted PDF file, an attacker\ncould possibly use this issue to cause a denial of service. This issue\nonly affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and\nUbuntu 20.04 LTS. (CVE-2019-10723)\n","modified":"2026-04-27T17:17:22.960048323Z","published":"2025-01-20T04:29:20Z","related":["UBUNTU-CVE-2017-5886","UBUNTU-CVE-2018-11255","UBUNTU-CVE-2018-12983","UBUNTU-CVE-2018-20797","UBUNTU-CVE-2018-5308","UBUNTU-CVE-2018-8002","UBUNTU-CVE-2019-10723","UBUNTU-CVE-2020-18971","UBUNTU-CVE-2021-30470","UBUNTU-CVE-2021-30471"],"upstream":["CVE-2017-5886","CVE-2018-11255","CVE-2018-12983","CVE-2018-20797","CVE-2018-5308","CVE-2018-8002","CVE-2019-10723","CVE-2020-18971","CVE-2021-30470","CVE-2021-30471","UBUNTU-CVE-2017-5886","UBUNTU-CVE-2018-11255","UBUNTU-CVE-2018-12983","UBUNTU-CVE-2018-20797","UBUNTU-CVE-2018-5308","UBUNTU-CVE-2018-8002","UBUNTU-CVE-2019-10723","UBUNTU-CVE-2020-18971","UBUNTU-CVE-2021-30470","UBUNTU-CVE-2021-30471"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7217-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5886"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5308"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-8002"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11255"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-12983"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20797"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-10723"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-18971"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-30470"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-30471"}],"affected":[{"package":{"name":"libpodofo","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/libpodofo@0.9.0-1.2ubuntu0.1~esm3?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.0-1.2ubuntu0.1~esm3"}]}],"versions":["0.9.0-1.1ubuntu1","0.9.0-1.2","0.9.0-1.2ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.9.0-1.2ubuntu0.1~esm3","binary_name":"libpodofo-utils"},{"binary_version":"0.9.0-1.2ubuntu0.1~esm3","binary_name":"libpodofo0.9.0"}],"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2018-5308","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-11255","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-12983","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-10723","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7217-1.json"}},{"package":{"name":"libpodofo","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/libpodofo@0.9.3-4ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.3-4ubuntu0.1~esm1"}]}],"versions":["0.9.0-1.3","0.9.3-3","0.9.3-4"],"ecosystem_specific":{"binaries":[{"binary_version":"0.9.3-4ubuntu0.1~esm1","binary_name":"libpodofo-utils"},{"binary_version":"0.9.3-4ubuntu0.1~esm1","binary_name":"libpodofo0.9.3"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2017-5886","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-5308","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-8002","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-11255","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-12983","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-20797","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2019-10723","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7217-1.json"}},{"package":{"name":"libpodofo","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/libpodofo@0.9.5-9ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.5-9ubuntu0.1~esm1"}]}],"versions":["0.9.5-6","0.9.5-8","0.9.5-8build1","0.9.5-9"],"ecosystem_specific":{"binaries":[{"binary_version":"0.9.5-9ubuntu0.1~esm1","binary_name":"libpodofo-utils"},{"binary_version":"0.9.5-9ubuntu0.1~esm1","binary_name":"libpodofo0.9.5"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"id":"CVE-2018-8002","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-11255","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-12983","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-20797","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-10723","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7217-1.json"}},{"package":{"name":"libpodofo","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/libpodofo@0.9.6+dfsg-5ubuntu0.1~esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.6+dfsg-5ubuntu0.1~esm1"}]}],"versions":["0.9.6+dfsg-5","0.9.6+dfsg-5build1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.9.6+dfsg-5ubuntu0.1~esm1","binary_name":"libpodofo-utils"},{"binary_version":"0.9.6+dfsg-5ubuntu0.1~esm1","binary_name":"libpodofo0.9.6"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:20.04:LTS","cves":[{"id":"CVE-2018-5308","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-8002","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-11255","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-12983","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-20797","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-10723","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-18971","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-30470","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-30471","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7217-1.json"}},{"package":{"name":"libpodofo","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/libpodofo@0.9.7+dfsg-3ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.7+dfsg-3ubuntu0.1~esm1"}]}],"versions":["0.9.7+dfsg-2","0.9.7+dfsg-2build1","0.9.7+dfsg-2build2","0.9.7+dfsg-3"],"ecosystem_specific":{"binaries":[{"binary_version":"0.9.7+dfsg-3ubuntu0.1~esm1","binary_name":"libpodofo-utils"},{"binary_version":"0.9.7+dfsg-3ubuntu0.1~esm1","binary_name":"libpodofo0.9.7"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:22.04:LTS","cves":[{"id":"CVE-2018-5308","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-8002","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-11255","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-12983","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-20797","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-10723","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-18971","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-30470","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-30471","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7217-1.json"}}],"schema_version":"1.7.5"}