You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa bibutils

Sigurnosni nedostaci programskog paketa bibutils

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2018-9ec3061fc8
2018-08-01 17:54:21.486173
——————————————————————————–

Name : bibutils
Product : Fedora 27
Version : 6.6
Release : 1.fc27
URL : http://sourceforge.net/p/bibutils/home/Bibutils/
Summary : Bibliography conversion tools
Description :
The bibutils package converts between various bibliography
formats using a common MODS-format XML intermediate.

——————————————————————————–
Update Information:

Update to 6.6. —- Version 6.5 – address CVE-2018-10773, CVE-2018-10774,
CVE-2018-10775 – fix injection of Fedora LDFLAGS
——————————————————————————–
ChangeLog:

* Mon Jul 23 2018 Vasiliy N. Glazov <vascom2@gmail.com> 6.6-1
– Update to 6.6
– Drop patch
– Clean spec
* Fri Jun 29 2018 Jens Petersen <petersen@redhat.com> – 6.5-1
– update to version 6.5
– build with LDFLAGS (#1541039)
* Wed Jun 6 2018 Jens Petersen <petersen@redhat.com> – 6.3-1
– update to 6.3 which addresses CVE-2018-10773 CVE-2018-10774 CVE-2018-10775
(#1577259)
* Mon Feb 19 2018 Jens Petersen <petersen@redhat.com> – 6.2-4
– BR gcc
* Wed Feb 14 2018 Jens Petersen <petersen@redhat.com> – 6.2-3
– fix the build with CFLAGS and LDFLAGS
* Fri Feb 2 2018 Jens Petersen <petersen@redhat.com> – 6.2-2
– using distro LDFLAGS (#1541039)
* Sat Jan 13 2018 Jens Petersen <petersen@redhat.com> – 6.2-1
– update to 6.2
——————————————————————————–
References:

[ 1 ] Bug #1577280 – CVE-2018-10775 bibutils: NULL pointer dereference in _fields_add function in fields.c in libbibcore.a
https://bugzilla.redhat.com/show_bug.cgi?id=1577280
[ 2 ] Bug #1577268 – CVE-2018-10774 bibutils: Out-of-bounds Read in isiin_keyword function in isiin.c in libbibutils.a
https://bugzilla.redhat.com/show_bug.cgi?id=1577268
[ 3 ] Bug #1577258 – CVE-2018-10773 bibutils: NULL pointer deference in addsn function in serialno.c in libbibcore.a
https://bugzilla.redhat.com/show_bug.cgi?id=1577258
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-9ec3061fc8’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKQ7A6ZKXW3JBJTXB5BIF3HQHBR62IDZ/

——————————————————————————–
Fedora Update Notification
FEDORA-2018-67914db5d9
2018-08-01 17:40:25.253069
——————————————————————————–

Name : bibutils
Product : Fedora 28
Version : 6.6
Release : 1.fc28
URL : http://sourceforge.net/p/bibutils/home/Bibutils/
Summary : Bibliography conversion tools
Description :
The bibutils package converts between various bibliography
formats using a common MODS-format XML intermediate.

——————————————————————————–
Update Information:

Update to 6.6. —- Version 6.5 – address CVE-2018-10773, CVE-2018-10774,
CVE-2018-10775 – fix injection of Fedora LDFLAGS
——————————————————————————–
ChangeLog:

* Mon Jul 23 2018 Vasiliy N. Glazov <vascom2@gmail.com> 6.6-1
– Update to 6.6
– Drop patch
– Clean spec
* Thu Jul 12 2018 Fedora Release Engineering <releng@fedoraproject.org> – 6.5-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Fri Jun 29 2018 Jens Petersen <petersen@redhat.com> – 6.5-1
– update to version 6.5
– build with LDFLAGS (#1541039)
* Wed Jun 6 2018 Jens Petersen <petersen@redhat.com> – 6.3-1
– update to 6.3 which addresses CVE-2018-10773 CVE-2018-10774 CVE-2018-10775
(#1577259)
——————————————————————————–
References:

[ 1 ] Bug #1577280 – CVE-2018-10775 bibutils: NULL pointer dereference in _fields_add function in fields.c in libbibcore.a
https://bugzilla.redhat.com/show_bug.cgi?id=1577280
[ 2 ] Bug #1577268 – CVE-2018-10774 bibutils: Out-of-bounds Read in isiin_keyword function in isiin.c in libbibutils.a
https://bugzilla.redhat.com/show_bug.cgi?id=1577268
[ 3 ] Bug #1577258 – CVE-2018-10773 bibutils: NULL pointer deference in addsn function in serialno.c in libbibcore.a
https://bugzilla.redhat.com/show_bug.cgi?id=1577258
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-67914db5d9’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHHMR233SX3IREDXK422HLU3JF67AZ3L/

AutorDanijel Kozinovic
Cert idNCERT-REF-2018-08-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa bouncycastle

Otkriveni su sigurnosni nedostaci u programskom paketu bouncycastle za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju otkrivanje osjetljivih...

Close