Fedora Linux 8695 Published by

A rubygem-pdfkit security update has been released for Fedora 37.



SECURITY: Fedora 37 Update: rubygem-pdfkit-0.8.7.2-1.fc37


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-c0d55cd527
2022-11-10 22:04:44.632108
--------------------------------------------------------------------------------

Name : rubygem-pdfkit
Product : Fedora 37
Version : 0.8.7.2
Release : 1.fc37
URL :   https://github.com/pdfkit/pdfkit
Summary : HTML+CSS to PDF using wkhtmltopdf
Description :
Create PDFs using plain old HTML+CSS. Uses wkhtmltopdf
on the back-end which renders HTML using Webkit.

--------------------------------------------------------------------------------
Update Information:

New version 0.8.7.2 is released. ---- New version 0.8.7.1 is released. ----
Update to 0.8.7. This new release fixes CVE-2022-25765.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Oct 20 2022 Mamoru TASAKA - 0.8.7.2-1
- 0.8.7.2
* Tue Oct 18 2022 Mamoru TASAKA - 0.8.7.1-1
- 0.8.7.1
* Mon Oct 3 2022 Mamoru TASAKA - 0.8.7-1
- 0.8.7 (CVE-2022-25765, bug 2125608)
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2125609 - CVE-2022-25765 rubygem-pdfkit: pdfkit are vulnerable to Command Injection where the URL is not properly sanitized. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2125609
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-c0d55cd527' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________