Bug 1945364

Summary: python-pikepdf: XML External Entity processing vulnerability in PDF XMP metadata parsing
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: python-sig, quantum.analyst, ribarry, zdohnal
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: python-pikepdf 2.10.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-04-06 17:16:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1945365    
Bug Blocks: 1945366    

Description Pedro Sampaio 2021-03-31 18:00:25 UTC
python-pikepdf 2.10.0 fixed XML External Entity (XXE) processing vulnerability in PDF XMP metadata parsing.

Upstream patch:

https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a

References:

https://github.com/pikepdf/pikepdf/blob/master/docs/release_notes.rst

Comment 1 Pedro Sampaio 2021-03-31 18:00:48 UTC
Created python-pikepdf tracking bugs for this issue:

Affects: fedora-all [bug 1945365]

Comment 2 Todd Cullum 2021-04-06 17:16:11 UTC

*** This bug has been marked as a duplicate of bug 1946269 ***

Comment 3 Todd Cullum 2021-04-06 17:16:16 UTC
Statement:

This flaw was found to be a duplicate of CVE-2021-29421. Please see https://access.redhat.com/security/cve/CVE-2021-29421 for information about affected products and security errata.