Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in mingw-poppler
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in mingw-poppler
ID: FEDORA-2017-6127ddb036
Distribution: Fedora
Plattformen: Fedora 25
Datum: Do, 26. Oktober 2017, 08:23
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14617
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14928
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14927
Applikationen: mingw-poppler

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2017-6127ddb036
2017-10-25 19:26:45.871948
-------------------------------------------------------------------------------
-

Name : mingw-poppler
Product : Fedora 25
Version : 0.45.0
Release : 5.fc25
URL : http://poppler.freedesktop.org/
Summary : MinGW Windows Poppler library
Description :
MinGW Windows Poppler library.

-------------------------------------------------------------------------------
-
Update Information:

This update fixes the following security vulnerabilities: - CVE-2017-14517 -
CVE-2017-14518 - CVE-2017-14519 - CVE-2017-14617 - CVE-2017-14926 -
CVE-2017-14927 - CVE-2017-14928 - CVE-2017-14929 - CVE-2017-14975 and
CVE-2017-14976 - CVE-2017-14977
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1500345 - CVE-2017-14976 poppler: Heap-based buffer over-read in
the FoFiType1C::convertToType0 function
https://bugzilla.redhat.com/show_bug.cgi?id=1500345
[ 2 ] Bug #1500344 - CVE-2017-14977 poppler: NULL pointer dereference in the
FoFiTrueType::getCFFBlock function
https://bugzilla.redhat.com/show_bug.cgi?id=1500344
[ 3 ] Bug #1500343 - CVE-2017-14975 poppler: NULL pointer dereference in the
FoFiType1C::convertToType0 function
https://bugzilla.redhat.com/show_bug.cgi?id=1500343
[ 4 ] Bug #1499167 - CVE-2017-14929 poppler: Memory corruption via Gfx.cc
infinite loop
https://bugzilla.redhat.com/show_bug.cgi?id=1499167
[ 5 ] Bug #1499165 - CVE-2017-14519 poppler: Memory corruption via Gfx.cc
infinite loop
https://bugzilla.redhat.com/show_bug.cgi?id=1499165
[ 6 ] Bug #1499163 - CVE-2017-14518 poppler: Floating point exception in the
isImageInterpolationRequired() function
https://bugzilla.redhat.com/show_bug.cgi?id=1499163
[ 7 ] Bug #1499162 - CVE-2017-14517 poppler: NULL pointer dereference in the
XRef::parseEntry() function
https://bugzilla.redhat.com/show_bug.cgi?id=1499162
[ 8 ] Bug #1499905 - CVE-2017-14617 poppler: Floating point exception in the
ImageStream class
https://bugzilla.redhat.com/show_bug.cgi?id=1499905
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade mingw-poppler' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung