Login
Newsletter
Werbung

Sicherheit: Denial of Service in poppler
Aktuelle Meldungen Distributionen
Name: Denial of Service in poppler
ID: FEDORA-2019-69ec14786b
Distribution: Fedora
Plattformen: Fedora 30
Datum: Di, 13. August 2019, 08:01
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959
Applikationen: poppler

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2019-69ec14786b
2019-08-13 01:01:16.243480
-------------------------------------------------------------------------------
-

Name : poppler
Product : Fedora 30
Version : 0.73.0
Release : 14.fc30
URL : http://poppler.freedesktop.org/
Summary : PDF rendering library
Description :
poppler is a PDF rendering library.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2019-9959.
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Jul 24 2019 Marek Kasik <mkasik@redhat.com> - 0.73.0-14
- Ignore dict Length if it is broken
- Resolves: #1732342
* Thu May 30 2019 Marek Kasik <mkasik@redhat.com> - 0.73.0-13
- Don't read outside of image buffer in PSOutputDev
- Resolves: #1696640
* Thu May 30 2019 Marek Kasik <mkasik@redhat.com> - 0.73.0-12
- SplashXPathScanner::clipAALine: Fix crash on broken file
- Resolves: #1696640
* Thu May 30 2019 Marek Kasik <mkasik@redhat.com> - 0.73.0-11
- Restrict filling of overlapping boxes in Splash
- Resolves: #1696640
* Wed May 29 2019 Marek Kasik <mkasik@redhat.com> - 0.73.0-10
- Fail gracefully if not all components of JPEG2000Stream
- have the same size
- Resolves: #1713585
* Wed Apr 17 2019 Marek Kasik <mkasik@redhat.com> - 0.73.0-9
- Fix infinite loop in broken files
- Resolves: #1699863
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1732340 - CVE-2019-9959 poppler: Integer Overflow in
JPXStream::init function leading to memory consumption
https://bugzilla.redhat.com/show_bug.cgi?id=1732340
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-69ec14786b' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung