Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Nov 2025 07:27:08 GMT
From:      Kai Knoblich <kai@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 7bbae4233dc6 - main - security/vuxml: Document py-pdfminer.six security issue
Message-ID:  <202511170727.5AH7R8jE073265@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch main has been updated by kai:

URL: https://cgit.FreeBSD.org/ports/commit/?id=7bbae4233dc64e73311563a433a68eb3148340d4

commit 7bbae4233dc64e73311563a433a68eb3148340d4
Author:     Kai Knoblich <kai@FreeBSD.org>
AuthorDate: 2025-11-17 07:21:21 +0000
Commit:     Kai Knoblich <kai@FreeBSD.org>
CommitDate: 2025-11-17 07:25:03 +0000

    security/vuxml: Document py-pdfminer.six security issue
    
    * CVE-2025-64512 - 8.6
---
 security/vuxml/vuln/2025.xml | 31 +++++++++++++++++++++++++++++++
 1 file changed, 31 insertions(+)

diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 6fa3610be43d..311e55693be2 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,34 @@
+  <vuln vid="fa433f05-c217-11f0-82ac-901b0edee044">
+    <topic>py-pdfminer.six -- Arbitrary Code Execution in pdfminer.six via Crafted PDF Input</topic>
+    <affects>
+     <package>
+       <name>py310-pdfminer.six</name>
+       <name>py311-pdfminer.six</name>
+       <name>py312-pdfminer.six</name>
+       <name>py313-pdfminer.six</name>
+       <name>py313t-pdfminer.six</name>
+       <name>py314-pdfminer.six</name>
+       <range><lt>20251107</lt></range>
+     </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Pieter Marsman reports:</p>
+	<blockquote cite="https://github.com/pdfminer/pdfminer.six/security/advisories/GHSA-wf5f-4jwr-ppcp">;
+	  <p>pdfminer.six will execute arbitrary code from a malicious pickle file if provided with a malicious PDF file. The CMapDB._load_data() function in pdfminer.six uses pickle.loads() to deserialize pickle files. These pickle files are supposed to be part of the pdfminer.six distribution stored in the cmap/ directory, but a malicious PDF can specify an alternative directory and filename as long as the filename ends in .pickle.gz. A malicious, zipped pickle file can then contain code which will automatically execute when the PDF is processed.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-64512</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-64512</url>;
+    </references>
+    <dates>
+      <discovery>2025-11-07</discovery>
+      <entry>2025-11-17</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="bf6c9252-c2ec-11f0-8372-98b78501ef2a">
     <topic>sudo-rs -- Authenticating user not recorded properly in timestamp</topic>
     <affects>


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202511170727.5AH7R8jE073265>