[jira] [Commented] (FOP-2775) Japanese characters turn into "###" from XML/XSL to PDF conversion

2018-08-30 Thread Neha (JIRA)


[ 
https://issues.apache.org/jira/browse/FOP-2775?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16598258#comment-16598258
 ] 

Neha commented on FOP-2775:
---

Hi [~ssteiner1],

I have added font-family too.Attached screenshot for your reference 
!image-2018-08-31-11-05-39-202.png!

> Japanese characters turn into "###" from XML/XSL to PDF conversion
> --
>
> Key: FOP-2775
> URL: https://issues.apache.org/jira/browse/FOP-2775
> Project: FOP
>  Issue Type: Bug
>  Components: renderer/pdf
>Affects Versions: 2.0
>Reporter: Neha
>Priority: Major
> Attachments: FOPProject.zip, fop.xconf, 
> image-2018-08-31-11-05-39-202.png
>
>
> We are having trouble making Japanese language output with FOP when trying to 
> convert XML/XSL file to PDF file. The characters used in Japanese turns into 
> *###* in PDF file.
>  
> Attaching the project for reference.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Updated] (FOP-2775) Japanese characters turn into "###" from XML/XSL to PDF conversion

2018-08-30 Thread Neha (JIRA)


 [ 
https://issues.apache.org/jira/browse/FOP-2775?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Neha updated FOP-2775:
--
Attachment: image-2018-08-31-11-05-39-202.png

> Japanese characters turn into "###" from XML/XSL to PDF conversion
> --
>
> Key: FOP-2775
> URL: https://issues.apache.org/jira/browse/FOP-2775
> Project: FOP
>  Issue Type: Bug
>  Components: renderer/pdf
>Affects Versions: 2.0
>Reporter: Neha
>Priority: Major
> Attachments: FOPProject.zip, fop.xconf, 
> image-2018-08-31-11-05-39-202.png
>
>
> We are having trouble making Japanese language output with FOP when trying to 
> convert XML/XSL file to PDF file. The characters used in Japanese turns into 
> *###* in PDF file.
>  
> Attaching the project for reference.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Resolved] (FOP-2812) Update PDFBox to 2.0.11

2018-08-30 Thread simon steiner (JIRA)


 [ 
https://issues.apache.org/jira/browse/FOP-2812?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

simon steiner resolved FOP-2812.

Resolution: Fixed

[http://svn.apache.org/viewvc?view=revision=1839650]

http://svn.apache.org/viewvc?view=revision=1839651

> Update PDFBox to 2.0.11
> ---
>
> Key: FOP-2812
> URL: https://issues.apache.org/jira/browse/FOP-2812
> Project: FOP
>  Issue Type: Bug
>  Components: unqualified
>Affects Versions: 2.3
>Reporter: Deodatta Marathe
>Assignee: simon steiner
>Priority: Major
>
> Description from CVE
> In Apache PDFBox 1.8.0 to 1.8.14 and 2.0.0RC1 to 2.0.10, a carefully crafted 
> (or fuzzed) file can trigger an infinite loop which leads to an out of memory 
> exception in Apache PDFBox's AFMParser.
> Explanation
> The Apache PDFBox is vulnerable to Uncontrolled Resource Consumption 
> ('Resource Exhaustion'). A successful exploit could trigger an infinite loop 
> scenario that may lead to an out-of-memory exception in the AFMParser 
> component, resulting in a DoS condition.
> Detection
> The application is vulnerable by using this component.
> Recommendation
> We recommend upgrading to a version of this component that is not vulnerable 
> to this specific issue.
> Categories
> Data
> Root Cause
> AFMParser.class : [2.0.0-RC1, 2.0.11)



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Updated] (FOP-2812) Update PDFBox to 2.0.11

2018-08-30 Thread simon steiner (JIRA)


 [ 
https://issues.apache.org/jira/browse/FOP-2812?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

simon steiner updated FOP-2812:
---
Summary: Update PDFBox to 2.0.11  (was: pdfbox fontbox 2.0.8 has security 
vulnerability CVE-2018-8036 and should be upgraded to 2.0.11)

> Update PDFBox to 2.0.11
> ---
>
> Key: FOP-2812
> URL: https://issues.apache.org/jira/browse/FOP-2812
> Project: FOP
>  Issue Type: Bug
>  Components: unqualified
>Affects Versions: 2.3
>Reporter: Deodatta Marathe
>Assignee: simon steiner
>Priority: Major
>
> Description from CVE
> In Apache PDFBox 1.8.0 to 1.8.14 and 2.0.0RC1 to 2.0.10, a carefully crafted 
> (or fuzzed) file can trigger an infinite loop which leads to an out of memory 
> exception in Apache PDFBox's AFMParser.
> Explanation
> The Apache PDFBox is vulnerable to Uncontrolled Resource Consumption 
> ('Resource Exhaustion'). A successful exploit could trigger an infinite loop 
> scenario that may lead to an out-of-memory exception in the AFMParser 
> component, resulting in a DoS condition.
> Detection
> The application is vulnerable by using this component.
> Recommendation
> We recommend upgrading to a version of this component that is not vulnerable 
> to this specific issue.
> Categories
> Data
> Root Cause
> AFMParser.class : [2.0.0-RC1, 2.0.11)



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)