Package: odoo
Version: 14.0.0+dfsg.2-7+deb11u1
Severity: grave
Tags: security
Justification: user security hole
X-Debbugs-Cc: t...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

See details of vulnerability at:

https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/

Note that I am not currently using the Debian version of the Odoo package, but
I noticed this issue when investigating the possibility of switching from the
Odoo-provided package.

All versions currently in Debian seem to be affected by this, as they embed
version 2.2.228 of PDFjs:

https://sources.debian.org/src/odoo/14.0.0%2Bdfsg.2-7%2Bdeb11u1/addons/web/static/lib/pdfjs/build/pdf.js/#L126
https://sources.debian.org/src/odoo/16.0.0%2Bdfsg.2-2/addons/web/static/lib/pdfjs/build/pdf.js/#L126

This vulnerability has been corrected in 4.2.67,
alternatively there seems to be a simple workaround described in:

https://github.com/mozilla/pdf.js/discussions/18168

-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (500, 'testing'), (50, 'unstable'), (10, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.8.12-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to