You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa podofo

Sigurnosni nedostaci programskog paketa podofo

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2018-5bd16d6143
2018-06-25 10:52:59.223373
——————————————————————————–

Name : podofo
Product : Fedora 28
Version : 0.9.5
Release : 9.fc28
URL : http://podofo.sourceforge.net
Summary : Tools and libraries to work with the PDF file format
Description :
PoDoFo is a library to work with the PDF file format. The name comes from
the first letter of PDF (Portable Document Format). A few tools to work
with PDF files are already included in the PoDoFo package.

The PoDoFo library is a free, portable C++ library which includes classes
to parse PDF files and modify their contents into memory. The changes can be
written back to disk easily. The parser can also be used to extract
information from a PDF file (for example the parser could be used in a PDF
viewer). Besides parsing PoDoFo includes also very simple classes to create
your own PDF files. All classes are documented so it is easy to start writing
your own application using PoDoFo.

——————————————————————————–
Update Information:

This update fixes multiple security vulnerabilities: CVE-2017-7380,
CVE-2017-7381, CVE-2017-7382, CVE-2017-7383, CVE-2017-5852, CVE-2017-5853,
CVE-2017-6844, CVE-2017-5854, CVE-2017-5855, CVE-2017-5886, CVE-2018-8000,
CVE-2017-6840, CVE-2017-6842, CVE-2017-6843, CVE-2017-6845, CVE-2017-6847,
CVE-2017-6848, CVE-2017-7378, CVE-2017-7379, CVE-2017-7994, CVE-2017-8054,
CVE-2017-8378, CVE-2017-8787, CVE-2018-5295, CVE-2018-5308
——————————————————————————–
ChangeLog:

* Fri Jun 15 2018 Sandro Mani <manisandro@gmail.com> – 0.9.5-9
– Backport security fixes (taken from debian package):
CVE-2017-7380, CVE-2017-7381, CVE-2017-7382, CVE-2017-7383, CVE-2017-5852,
CVE-2017-5853, CVE-2017-6844, CVE-2017-5854, CVE-2017-5855, CVE-2017-5886,
CVE-2018-8000, CVE-2017-6840, CVE-2017-6842, CVE-2017-6843, CVE-2017-6845,
CVE-2017-6847, CVE-2017-6848, CVE-2017-7378, CVE-2017-7379, CVE-2017-7994,
CVE-2017-8054, CVE-2017-8378, CVE-2017-8787, CVE-2018-5295, CVE-2018-5308
* Wed May 16 2018 Kevin Fenzi <kevin@scrye.com> – 0.9.5-8
– Rebuild for new libidn
——————————————————————————–
References:

[ 1 ] Bug #1418584 – CVE-2017-5852 CVE-2017-5853 CVE-2017-5854 CVE-2015-8981 CVE-2017-5855 CVE-2017-5886 podofo: Multiple security vulnerabilities
https://bugzilla.redhat.com/show_bug.cgi?id=1418584
[ 2 ] Bug #1445362 – CVE-2017-8378 CVE-2017-7994 CVE-2017-8053 CVE-2017-8054 CVE-2017-8787 CVE-2018-5295 CVE-2018-5296 podofo: Multiple security vulnerabilities
https://bugzilla.redhat.com/show_bug.cgi?id=1445362
[ 3 ] Bug #1438417 – CVE-2017-7383 CVE-2017-7382 CVE-2017-7381 CVE-2017-7380 CVE-2017-7379 CVE-2017-7378 podofo: Multiple security issues found in 0.9.5 version
https://bugzilla.redhat.com/show_bug.cgi?id=1438417
[ 4 ] Bug #1533649 – CVE-2018-5308 podofo: Out-of-bounds write in dfMemoryOutputStream::Write function in base/PdfOutputStream.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1533649
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-5bd16d6143’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2U7MKKI2OP43FRIS44DJXIJYDWTNAWQ6/

——————————————————————————–
Fedora Update Notification
FEDORA-2018-2f3c0cdf93
2018-06-25 10:21:20.595691
——————————————————————————–

Name : podofo
Product : Fedora 27
Version : 0.9.5
Release : 9.fc27
URL : http://podofo.sourceforge.net
Summary : Tools and libraries to work with the PDF file format
Description :
PoDoFo is a library to work with the PDF file format. The name comes from
the first letter of PDF (Portable Document Format). A few tools to work
with PDF files are already included in the PoDoFo package.

The PoDoFo library is a free, portable C++ library which includes classes
to parse PDF files and modify their contents into memory. The changes can be
written back to disk easily. The parser can also be used to extract
information from a PDF file (for example the parser could be used in a PDF
viewer). Besides parsing PoDoFo includes also very simple classes to create
your own PDF files. All classes are documented so it is easy to start writing
your own application using PoDoFo.

——————————————————————————–
Update Information:

This update fixes multiple security vulnerabilities: CVE-2017-7380,
CVE-2017-7381, CVE-2017-7382, CVE-2017-7383, CVE-2017-5852, CVE-2017-5853,
CVE-2017-6844, CVE-2017-5854, CVE-2017-5855, CVE-2017-5886, CVE-2018-8000,
CVE-2017-6840, CVE-2017-6842, CVE-2017-6843, CVE-2017-6845, CVE-2017-6847,
CVE-2017-6848, CVE-2017-7378, CVE-2017-7379, CVE-2017-7994, CVE-2017-8054,
CVE-2017-8378, CVE-2017-8787, CVE-2018-5295, CVE-2018-5308
——————————————————————————–
ChangeLog:

* Fri Jun 15 2018 Sandro Mani <manisandro@gmail.com> – 0.9.5-9
– Backport security fixes (taken from debian package):
CVE-2017-7380, CVE-2017-7381, CVE-2017-7382, CVE-2017-7383, CVE-2017-5852,
CVE-2017-5853, CVE-2017-6844, CVE-2017-5854, CVE-2017-5855, CVE-2017-5886,
CVE-2018-8000, CVE-2017-6840, CVE-2017-6842, CVE-2017-6843, CVE-2017-6845,
CVE-2017-6847, CVE-2017-6848, CVE-2017-7378, CVE-2017-7379, CVE-2017-7994,
CVE-2017-8054, CVE-2017-8378, CVE-2017-8787, CVE-2018-5295, CVE-2018-5308
* Wed May 16 2018 Kevin Fenzi <kevin@scrye.com> – 0.9.5-8
– Rebuild for new libidn
* Fri Feb 9 2018 Fedora Release Engineering <releng@fedoraproject.org> – 0.9.5-7
– Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1418584 – CVE-2017-5852 CVE-2017-5853 CVE-2017-5854 CVE-2015-8981 CVE-2017-5855 CVE-2017-5886 podofo: Multiple security vulnerabilities
https://bugzilla.redhat.com/show_bug.cgi?id=1418584
[ 2 ] Bug #1445362 – CVE-2017-8378 CVE-2017-7994 CVE-2017-8053 CVE-2017-8054 CVE-2017-8787 CVE-2018-5295 CVE-2018-5296 podofo: Multiple security vulnerabilities
https://bugzilla.redhat.com/show_bug.cgi?id=1445362
[ 3 ] Bug #1438417 – CVE-2017-7383 CVE-2017-7382 CVE-2017-7381 CVE-2017-7380 CVE-2017-7379 CVE-2017-7378 podofo: Multiple security issues found in 0.9.5 version
https://bugzilla.redhat.com/show_bug.cgi?id=1438417
[ 4 ] Bug #1533649 – CVE-2018-5308 podofo: Out-of-bounds write in dfMemoryOutputStream::Write function in base/PdfOutputStream.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1533649
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-2f3c0cdf93’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OEMA3VKO24P6OVWPTL7HRIU53H6FCBAJ/

AutorPetar Bertok
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa go1.9

Otkriveni su sigurnosni nedostaci u programskom paketu go1.9 za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja...

Close