You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa xpdf

Sigurnosni nedostaci programskog paketa xpdf

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2019-a457286734
2019-10-25 16:59:13.269627
——————————————————————————–

Name : xpdf
Product : Fedora 30
Version : 4.02
Release : 1.fc30
URL : http://www.xpdfreader.com/
Summary : A PDF file viewer for the X Window System
Description :
Xpdf is an X Window System based viewer for Portable Document Format
(PDF) files. Xpdf is a small and efficient program which uses
standard X fonts.

——————————————————————————–
Update Information:

xpdf 4.02. Lots of security fixes here.
——————————————————————————–
ChangeLog:

* Wed Oct 16 2019 Tom Callaway <spot@fedoraproject.org> – 1:4.02-1
– update to 4.02
* Sat Jul 27 2019 Fedora Release Engineering <releng@fedoraproject.org> – 1:4.01-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1728103 – CVE-2019-13286 xpdf: heap-based buffer over-read in function JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1728103
[ 2 ] Bug #1727737 – CVE-2019-13281 xpdf: heap-based buffer overflow in DCTStream::decodeImage() in Stream.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1727737
[ 3 ] Bug #1727734 – CVE-2019-13282 xpdf: heap-based buffer over-read in SampledFunction::transform in Function.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1727734
[ 4 ] Bug #1727730 – CVE-2019-13283 xpdf: heap-based buffer over-read in FoFiType1::parse in fofi/FoFiType1.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1727730
[ 5 ] Bug #1725690 – CVE-2019-12957 CVE-2019-12958 xpdf: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1725690
[ 6 ] Bug #1716836 – CVE-2019-12493 xpdf: stack-based buffer over-read in function PostScriptFunction::transform in Function.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1716836
[ 7 ] Bug #1716827 – CVE-2019-12515 xpdf: out-of-bounds read in function FlateStream::getChar() in Stream.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1716827
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-a457286734’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2019-01da705767
2019-10-25 18:06:00.866760
——————————————————————————–

Name : xpdf
Product : Fedora 29
Version : 4.02
Release : 1.fc29
URL : http://www.xpdfreader.com/
Summary : A PDF file viewer for the X Window System
Description :
Xpdf is an X Window System based viewer for Portable Document Format
(PDF) files. Xpdf is a small and efficient program which uses
standard X fonts.

——————————————————————————–
Update Information:

xpdf 4.02. Lots of security fixes here.
——————————————————————————–
ChangeLog:

* Wed Oct 16 2019 Tom Callaway <spot@fedoraproject.org> – 1:4.02-1
– update to 4.02
* Sat Jul 27 2019 Fedora Release Engineering <releng@fedoraproject.org> – 1:4.01-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
* Fri Feb 22 2019 Tom Callaway <spot@fedoraproject.org> 1:4.01-1
– update to 4.01
* Sun Feb 3 2019 Fedora Release Engineering <releng@fedoraproject.org> – 1:4.00-9
– Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1728103 – CVE-2019-13286 xpdf: heap-based buffer over-read in function JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1728103
[ 2 ] Bug #1727737 – CVE-2019-13281 xpdf: heap-based buffer overflow in DCTStream::decodeImage() in Stream.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1727737
[ 3 ] Bug #1727734 – CVE-2019-13282 xpdf: heap-based buffer over-read in SampledFunction::transform in Function.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1727734
[ 4 ] Bug #1727730 – CVE-2019-13283 xpdf: heap-based buffer over-read in FoFiType1::parse in fofi/FoFiType1.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1727730
[ 5 ] Bug #1725690 – CVE-2019-12957 CVE-2019-12958 xpdf: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1725690
[ 6 ] Bug #1716836 – CVE-2019-12493 xpdf: stack-based buffer over-read in function PostScriptFunction::transform in Function.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1716836
[ 7 ] Bug #1716827 – CVE-2019-12515 xpdf: out-of-bounds read in function FlateStream::getChar() in Stream.cc [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1716827
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-01da705767’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorJosip Papratovic
Cert idNCERT-REF-2019-10-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa jss

Otkriven je sigurnosni nedostatak u programskom paketu jss za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje MitM napada....

Close