Login
Newsletter
Werbung

Sicherheit: Preisgabe von Informationen in libRSVG
Aktuelle Meldungen Distributionen
Name: Preisgabe von Informationen in libRSVG
ID: openSUSE-SU-2018:1310-1
Distribution: SUSE
Plattformen: openSUSE Leap 42.3
Datum: Do, 17. Mai 2018, 06:51
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000041
Applikationen: libRSVG

Originalnachricht

   openSUSE Security Update: Security update for librsvg
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:1310-1
Rating: moderate
References: #1083232
Cross-References: CVE-2018-1000041
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for librsvg fixes the following issues:

- CVE-2018-1000041: Input validation issue could lead to credentials leak.
(bsc#1083232)

Update to version 2.40.20:

+ Except for emergencies, this will be the LAST RELEASE of the
librsvg-2.40.x series. We are moving to 2.41, which is vastly
improved over the 2.40 series. The API/ABI there remain unchaged, so
we strongly encourage you to upgrade your sources and binaries to
librsvg-2.41.x.
+ bgo#761175 - Allow masks and clips to reuse a node being drawn.
+ Don't access the file system when deciding whether to load a remote
file with a UNC path for a paint server (i.e. don't try to load it
at
all).
+ Vistual Studio: fixed and integrated introspection builds, so
introspection data is built directly from the Visual Studio project
(Chun-wei Fan).
+ Visual Studio: We now use HIGHENTROPYVA linker option on x64 builds,
to enhance the security of built binaries (Chun-wei Fan).
+ Fix generation of Vala bindings when compiling in read-only source
directories (Emmanuele Bassi).

Update to version 2.40.19:

+ bgo#621088: Using text objects as clipping paths is now supported.
+ bgo#587721: Fix rendering of text elements with transformations
(Massimo).
+ bgo#777833 - Fix memory leaks when an RsvgHandle is disposed before
being closed (Philip Withnall).
+ bgo#782098 - Don't pass deprecated options to gtk-doc (Ting-Wei
Lan).
+ bgo#786372 - Fix the default for the "type" attribute of the
<style>
element.
+ bgo#785276 - Don't crash on single-byte files.
+ bgo#634514: Don't render unknown elements and their sub-elements.
+ bgo#777155 - Ignore patterns that have close-to-zero dimensions.
+ bgo#634324 - Fix Gaussian blurs with negative scaling.
+ Fix the <switch> element; it wasn't working at all.
+ Fix loading when rsvg_handle_write() is called one byte at a time.
+ bgo#787895 - Fix incorrect usage of libxml2. Thanks to Nick
Wellnhofer for advice on this.
+ Backported the test suite machinery from the master branch (Chun-wei
Fan, Federico Mena).
+ We now require Pango 1.38.0 or later (released in 2015).
+ We now require libxml2 2.9.0 or later (released in 2012).

This update was imported from the SUSE:SLE-12-SP2:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-466=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

gdk-pixbuf-loader-rsvg-2.40.20-15.1
gdk-pixbuf-loader-rsvg-debuginfo-2.40.20-15.1
librsvg-2-2-2.40.20-15.1
librsvg-2-2-debuginfo-2.40.20-15.1
librsvg-debugsource-2.40.20-15.1
librsvg-devel-2.40.20-15.1
rsvg-view-2.40.20-15.1
rsvg-view-debuginfo-2.40.20-15.1
typelib-1_0-Rsvg-2_0-2.40.20-15.1

- openSUSE Leap 42.3 (x86_64):

gdk-pixbuf-loader-rsvg-32bit-2.40.20-15.1
gdk-pixbuf-loader-rsvg-debuginfo-32bit-2.40.20-15.1
librsvg-2-2-32bit-2.40.20-15.1
librsvg-2-2-debuginfo-32bit-2.40.20-15.1

- openSUSE Leap 42.3 (noarch):

rsvg-thumbnailer-2.40.20-15.1


References:

https://www.suse.com/security/cve/CVE-2018-1000041.html
https://bugzilla.suse.com/1083232

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung