Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in mingw-poppler
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in mingw-poppler
ID: FEDORA-2017-93868169a0
Distribution: Fedora
Plattformen: Fedora 24
Datum: Fr, 28. Juli 2017, 00:01
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7515
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776
Applikationen: poppler

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2017-93868169a0
2017-07-27 14:24:45.247039
-------------------------------------------------------------------------------
-

Name : mingw-poppler
Product : Fedora 24
Version : 0.41.0
Release : 3.fc24
URL : http://poppler.freedesktop.org/
Summary : MinGW Windows Poppler library
Description :
MinGW Windows Poppler library.

-------------------------------------------------------------------------------
-
Update Information:

This update fixes multiple security vulnerabilities (CVE-2017-7515,
CVE-2017-9775, CVE-2017-9776, CVE-2017-9865).
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1466442 - CVE-2017-9775 poppler: Stack-buffer overflow in
GfxState.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1466442
[ 2 ] Bug #1466435 - CVE-2017-9865 poppler: Buffer over-read in the
GfxImageColorMap::getGray function
https://bugzilla.redhat.com/show_bug.cgi?id=1466435
[ 3 ] Bug #1459066 - CVE-2017-7515 poppler: Stack exhaustion due to infinite
recursive call in pdfunite
https://bugzilla.redhat.com/show_bug.cgi?id=1459066
[ 4 ] Bug #1466443 - CVE-2017-9776 poppler: Integer overflow in
JBIG2Stream.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1466443
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade mingw-poppler' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung