Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in podofo
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in podofo
ID: FEDORA-2018-6b9320d9c9
Distribution: Fedora
Plattformen: Fedora 29
Datum: Di, 25. Dezember 2018, 10:11
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11255
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15889
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19532
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14320
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11256
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11254
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12982
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5783
Applikationen: PoDoFo

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2018-6b9320d9c9
2018-12-25 03:10:00.589976
-------------------------------------------------------------------------------
-

Name : podofo
Product : Fedora 29
Version : 0.9.6
Release : 3.fc29
URL : http://podofo.sourceforge.net
Summary : Tools and libraries to work with the PDF file format
Description :
PoDoFo is a library to work with the PDF file format. The name comes from
the first letter of PDF (Portable Document Format). A few tools to work
with PDF files are already included in the PoDoFo package.

The PoDoFo library is a free, portable C++ library which includes classes
to parse PDF files and modify their contents into memory. The changes can be
written back to disk easily. The parser can also be used to extract
information from a PDF file (for example the parser could be used in a PDF
viewer). Besides parsing PoDoFo includes also very simple classes to create
your own PDF files. All classes are documented so it is easy to start writing
your own application using PoDoFo.

-------------------------------------------------------------------------------
-
Update Information:

This update fixes multiple security vulnerabilities: CVE-2018-5783,
CVE-2018-11254, CVE-2018-11255, CVE-2018-11256, CVE-2018-12982, CVE-2018-14320,
CVE-2018-19532
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Dec 19 2018 Sandro Mani <manisandro@gmail.com> - 0.9.6-3
- Backport security fixes:
CVE-2018-5783, CVE-2018-11254, CVE-2018-11255, CVE-2018-11256,
CVE-2018-12982, CVE-2018-14320, CVE-2018-19532
- Run unit tests
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1656191 - CVE-2018-19532 podofo: NULL pointer dereference in
PdfTranslator::setTarget() in pdftranslator.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1656191
[ 2 ] Bug #1631429 - CVE-2018-14320 podofo: Lack of proper validation of user
supplied data can result in information disclosure
https://bugzilla.redhat.com/show_bug.cgi?id=1631429
[ 3 ] Bug #1622921 - CVE-2018-15889 podofo: Insufficient input validation in
PoDoFo::PdfVecObjects::Reserve()
https://bugzilla.redhat.com/show_bug.cgi?id=1622921
[ 4 ] Bug #1597426 - CVE-2018-12982 podofo: invalid memory read in the
PoDoFo::PdfVariant::DelayedLoad function
https://bugzilla.redhat.com/show_bug.cgi?id=1597426
[ 5 ] Bug #1581283 - CVE-2018-11256 podofo: NULL pointer dereference in the
function PdfDocument::Append() in PdfDocument.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1581283
[ 6 ] Bug #1581282 - CVE-2018-11255 podofo: NULL pointer dereference in the
function PdfPage::GetPageNumber() in PdfPage.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1581282
[ 7 ] Bug #1581281 - CVE-2018-11254 podofo: Excessive Recursion in the
PdfPagesTree::GetPageNode() function of PdfPagesTree.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1581281
[ 8 ] Bug #1537634 - CVE-2018-5783 podofo: uncontrolled memory allocation in
the PoDoFo::PdfVecObjects::Reserve function in base/PdfVecObjects.h
https://bugzilla.redhat.com/show_bug.cgi?id=1537634
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-6b9320d9c9' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung