Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in poppler
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in poppler
ID: FEDORA-2019-8729e0edf5
Distribution: Fedora
Plattformen: Fedora 29
Datum: Di, 13. August 2019, 08:02
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959
Applikationen: poppler

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2019-8729e0edf5
2019-08-13 01:58:20.879510
-------------------------------------------------------------------------------
-

Name : poppler
Product : Fedora 29
Version : 0.67.0
Release : 22.fc29
URL : http://poppler.freedesktop.org/
Summary : PDF rendering library
Description :
poppler is a PDF rendering library.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2019-9959.
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Jul 24 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-22
- Ignore dict Length if it is broken
- Resolves: #1732342
* Thu May 30 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-21
- Don't read outside of image buffer in PSOutputDev
- Resolves: #1696640
* Thu May 30 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-20
- Restrict filling of overlapping boxes in Splash
- Resolves: #1696640
* Thu May 30 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-19
- Fail gracefully if not all components of JPEG2000Stream
- have the same size
- Resolves: #1713585
* Wed Apr 17 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-18
- Fix stack overflow on broken file
- Resolves: #1691725
* Wed Apr 17 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-17
- Fix infinite loop in broken files
- Resolves: #1699863
* Mon Apr 1 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-16
- Constrain number of cycles in rescale filter
- Compute correct coverage values for box filter
- Resolves: #1686803
* Mon Apr 1 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-15
- Check for Ref type before unwrapping Object
- Resolves: #1694457
* Mon Mar 11 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-14
- Fix possible crash on broken files in ImageStream::getLine()
- Resolves: #1683633
* Fri Mar 8 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-13
- Synchronize previous patch with upstream
- Related: #1665274
* Wed Feb 20 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-12
- Check Catalog from XRef for being a Dict
- Resolves: #1665274
* Wed Feb 20 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-11
- Defend against requests for negative XRef indices
- Resolves: #1672420
* Tue Jan 22 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-10
- Avoid global display profile state becoming an uncontrolled
- memory leak
- Resolves: #1646549
* Mon Jan 21 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-9
- Do not try to parse into unallocated XRef entry
- Resolves: #1665268
* Mon Jan 21 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-8
- Move the fileSpec.dictLookup call inside fileSpec.isDict if
- Resolves: #1665264
* Mon Jan 21 2019 Marek Kasik <mkasik@redhat.com> - 0.67.0-7
- Do not try to construct invalid rich media annotation assets
- Resolves: #1665260
* Thu Nov 15 2018 Marek Kasik <mkasik@redhat.com> - 0.67.0-6
- Check for valid file name of embedded file
- Resolves: #1649451
* Thu Nov 15 2018 Marek Kasik <mkasik@redhat.com> - 0.67.0-5
- Check for valid embedded file before trying to save it
- Resolves: #1649441
* Thu Nov 15 2018 Marek Kasik <mkasik@redhat.com> - 0.67.0-4
- Check for stream before calling stream methods
- when saving an embedded file
- Resolves: #1649436
* Mon Nov 12 2018 Marek Kasik <mkasik@redhat.com> - 0.67.0-3
- Avoid cycles in PDF parsing
- Resolves: #1626620
* Wed Oct 17 2018 Marek Kasik <mkasik@redhat.com> - 0.67.0-2
- Fix crash on missing embedded file
- Resolves: #1569334
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1732340 - CVE-2019-9959 poppler: Integer Overflow in
JPXStream::init function leading to memory consumption
https://bugzilla.redhat.com/show_bug.cgi?id=1732340
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-8729e0edf5' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung