Mehrere Probleme in mingw-poppler
ID: | FEDORA-2017-6127ddb036 |
Distribution: | Fedora |
Plattformen: | Fedora 25 |
Datum: | Do, 26. Oktober 2017, 08:23 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14617 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14929 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14928 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14926 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14927 |
Applikationen: | poppler |
Originalnachricht |
|
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2017-6127ddb036 2017-10-25 19:26:45.871948 -------------------------------------------------------------------------------- Name : mingw-poppler Product : Fedora 25 Version : 0.45.0 Release : 5.fc25 URL : http://poppler.freedesktop.org/ Summary : MinGW Windows Poppler library Description : MinGW Windows Poppler library. -------------------------------------------------------------------------------- Update Information: This update fixes the following security vulnerabilities: - CVE-2017-14517 - CVE-2017-14518 - CVE-2017-14519 - CVE-2017-14617 - CVE-2017-14926 - CVE-2017-14927 - CVE-2017-14928 - CVE-2017-14929 - CVE-2017-14975 and CVE-2017-14976 - CVE-2017-14977 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1500345 - CVE-2017-14976 poppler: Heap-based buffer over-read in the FoFiType1C::convertToType0 function https://bugzilla.redhat.com/show_bug.cgi?id=1500345 [ 2 ] Bug #1500344 - CVE-2017-14977 poppler: NULL pointer dereference in the FoFiTrueType::getCFFBlock function https://bugzilla.redhat.com/show_bug.cgi?id=1500344 [ 3 ] Bug #1500343 - CVE-2017-14975 poppler: NULL pointer dereference in the FoFiType1C::convertToType0 function https://bugzilla.redhat.com/show_bug.cgi?id=1500343 [ 4 ] Bug #1499167 - CVE-2017-14929 poppler: Memory corruption via Gfx.cc infinite loop https://bugzilla.redhat.com/show_bug.cgi?id=1499167 [ 5 ] Bug #1499165 - CVE-2017-14519 poppler: Memory corruption via Gfx.cc infinite loop https://bugzilla.redhat.com/show_bug.cgi?id=1499165 [ 6 ] Bug #1499163 - CVE-2017-14518 poppler: Floating point exception in the isImageInterpolationRequired() function https://bugzilla.redhat.com/show_bug.cgi?id=1499163 [ 7 ] Bug #1499162 - CVE-2017-14517 poppler: NULL pointer dereference in the XRef::parseEntry() function https://bugzilla.redhat.com/show_bug.cgi?id=1499162 [ 8 ] Bug #1499905 - CVE-2017-14617 poppler: Floating point exception in the ImageStream class https://bugzilla.redhat.com/show_bug.cgi?id=1499905 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade mingw-poppler' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org |