<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for pdfbox is now available for openEuler-24.03-LTS-SP3</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-2148</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-05-03</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-05-03</InitialReleaseDate>
		<CurrentReleaseDate>2026-05-03</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-05-03</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">pdfbox security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for pdfbox is now available for openEuler-24.03-LTS-SP3</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Apache PDFBox is an open source Java PDF library for working with PDF documents. This project allows creation of new PDF documents, manipulation of existing documents and the ability to extract content from documents. Apache PDFBox also includes several command line utilities. Apache PDFBox is published under the Apache License v2.0.

Security Fix(es):

Improper Limitation of a Pathname to a Restricted Directory (&apos;Path Traversal&apos;) vulnerability in Apache PDFBox Examples.

This issue affects the 
ExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.36, from 3.0.0 through 3.0.7.


Users are recommended to update to version 2.0.37 or 3.0.8 once 
available. Until then, they should apply the fix provided in GitHub PR 
427.

The ExtractEmbeddedFiles example contained a path traversal vulnerability (CWE-22) mentioned in CVE-2026-23907. However the change in the releases 2.0.36 and 3.0.7 is flawed because it doesn&apos;t consider the file path separator. Because of that, a user having writing rights on /home/ABC could be victim to a malicious PDF resulting in a write attempt to any path starting with /home/ABC, e.g. &quot;/home/ABCDEF&quot;.

Users who have copied this example into their production code should apply the mentioned change. The example 
has been changed accordingly and is available in the project repository.(CVE-2026-33929)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for pdfbox is now available for master/openEuler-20.03-LTS-SP4/openEuler-22.03-LTS-SP4/openEuler-24.03-LTS/openEuler-24.03-LTS-Next/openEuler-24.03-LTS-SP1/openEuler-24.03-LTS-SP2/openEuler-24.03-LTS-SP3/openEuler-24.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">pdfbox</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2148</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-33929</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-33929</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openEuler-24.03-LTS-SP3</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="fontbox-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">fontbox-2.0.29-2.oe2403sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="pdfbox-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">pdfbox-2.0.29-2.oe2403sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="pdfbox-debugger-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">pdfbox-debugger-2.0.29-2.oe2403sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="pdfbox-javadoc-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">pdfbox-javadoc-2.0.29-2.oe2403sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="pdfbox-parent-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">pdfbox-parent-2.0.29-2.oe2403sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="pdfbox-reactor-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">pdfbox-reactor-2.0.29-2.oe2403sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="pdfbox-tools-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">pdfbox-tools-2.0.29-2.oe2403sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="preflight-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">preflight-2.0.29-2.oe2403sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="xmpbox-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">xmpbox-2.0.29-2.oe2403sp3.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="pdfbox-2.0.29-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">pdfbox-2.0.29-2.oe2403sp3.src.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper Limitation of a Pathname to a Restricted Directory (&apos;Path Traversal&apos;) vulnerability in Apache PDFBox Examples.

This issue affects the 
ExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.36, from 3.0.0 through 3.0.7.


Users are recommended to update to version 2.0.37 or 3.0.8 once 
available. Until then, they should apply the fix provided in GitHub PR 
427.

The ExtractEmbeddedFiles example contained a path traversal vulnerability (CWE-22) mentioned in CVE-2026-23907. However the change in the releases 2.0.36 and 3.0.7 is flawed because it doesn&apos;t consider the file path separator. Because of that, a user having writing rights on /home/ABC could be victim to a malicious PDF resulting in a write attempt to any path starting with /home/ABC, e.g. &quot;/home/ABCDEF&quot;.

Users who have copied this example into their production code should apply the mentioned change. The example 
has been changed accordingly and is available in the project repository.</Note>
		</Notes>
		<ReleaseDate>2026-05-03</ReleaseDate>
		<CVE>CVE-2026-33929</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.3</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>pdfbox security update</Description>
				<DATE>2026-05-03</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2148</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>