You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mingw-poppler

Sigurnosni nedostaci programskog paketa mingw-poppler

——————————————————————————–
Fedora Update Notification
FEDORA-2017-6127ddb036
2017-10-25 19:26:45.871948
——————————————————————————–

Name : mingw-poppler
Product : Fedora 25
Version : 0.45.0
Release : 5.fc25
URL : http://poppler.freedesktop.org/
Summary : MinGW Windows Poppler library
Description :
MinGW Windows Poppler library.

——————————————————————————–
Update Information:

This update fixes the following security vulnerabilities: – CVE-2017-14517 –
CVE-2017-14518 – CVE-2017-14519 – CVE-2017-14617 – CVE-2017-14926 –
CVE-2017-14927 – CVE-2017-14928 – CVE-2017-14929 – CVE-2017-14975 and
CVE-2017-14976 – CVE-2017-14977
——————————————————————————–
References:

[ 1 ] Bug #1500345 – CVE-2017-14976 poppler: Heap-based buffer over-read in the FoFiType1C::convertToType0 function
https://bugzilla.redhat.com/show_bug.cgi?id=1500345
[ 2 ] Bug #1500344 – CVE-2017-14977 poppler: NULL pointer dereference in the FoFiTrueType::getCFFBlock function
https://bugzilla.redhat.com/show_bug.cgi?id=1500344
[ 3 ] Bug #1500343 – CVE-2017-14975 poppler: NULL pointer dereference in the FoFiType1C::convertToType0 function
https://bugzilla.redhat.com/show_bug.cgi?id=1500343
[ 4 ] Bug #1499167 – CVE-2017-14929 poppler: Memory corruption via Gfx.cc infinite loop
https://bugzilla.redhat.com/show_bug.cgi?id=1499167
[ 5 ] Bug #1499165 – CVE-2017-14519 poppler: Memory corruption via Gfx.cc infinite loop
https://bugzilla.redhat.com/show_bug.cgi?id=1499165
[ 6 ] Bug #1499163 – CVE-2017-14518 poppler: Floating point exception in the isImageInterpolationRequired() function
https://bugzilla.redhat.com/show_bug.cgi?id=1499163
[ 7 ] Bug #1499162 – CVE-2017-14517 poppler: NULL pointer dereference in the XRef::parseEntry() function
https://bugzilla.redhat.com/show_bug.cgi?id=1499162
[ 8 ] Bug #1499905 – CVE-2017-14617 poppler: Floating point exception in the ImageStream class
https://bugzilla.redhat.com/show_bug.cgi?id=1499905
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade mingw-poppler’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2017-a0ffdf1fbd
2017-10-25 21:34:15.278583
——————————————————————————–

Name : mingw-poppler
Product : Fedora 26
Version : 0.52.0
Release : 5.fc26
URL : http://poppler.freedesktop.org/
Summary : MinGW Windows Poppler library
Description :
MinGW Windows Poppler library.

——————————————————————————–
Update Information:

This update fixes the following security vulnerabilities: – CVE-2017-14517 –
CVE-2017-14518 – CVE-2017-14519 – CVE-2017-14617 – CVE-2017-14926 –
CVE-2017-14927 – CVE-2017-14928 – CVE-2017-14929 – CVE-2017-14975 and
CVE-2017-14976 – CVE-2017-14977
——————————————————————————–
References:

[ 1 ] Bug #1500345 – CVE-2017-14976 poppler: Heap-based buffer over-read in the FoFiType1C::convertToType0 function
https://bugzilla.redhat.com/show_bug.cgi?id=1500345
[ 2 ] Bug #1500344 – CVE-2017-14977 poppler: NULL pointer dereference in the FoFiTrueType::getCFFBlock function
https://bugzilla.redhat.com/show_bug.cgi?id=1500344
[ 3 ] Bug #1500343 – CVE-2017-14975 poppler: NULL pointer dereference in the FoFiType1C::convertToType0 function
https://bugzilla.redhat.com/show_bug.cgi?id=1500343
[ 4 ] Bug #1499167 – CVE-2017-14929 poppler: Memory corruption via Gfx.cc infinite loop
https://bugzilla.redhat.com/show_bug.cgi?id=1499167
[ 5 ] Bug #1499165 – CVE-2017-14519 poppler: Memory corruption via Gfx.cc infinite loop
https://bugzilla.redhat.com/show_bug.cgi?id=1499165
[ 6 ] Bug #1499163 – CVE-2017-14518 poppler: Floating point exception in the isImageInterpolationRequired() function
https://bugzilla.redhat.com/show_bug.cgi?id=1499163
[ 7 ] Bug #1499162 – CVE-2017-14517 poppler: NULL pointer dereference in the XRef::parseEntry() function
https://bugzilla.redhat.com/show_bug.cgi?id=1499162
[ 8 ] Bug #1499905 – CVE-2017-14617 poppler: Floating point exception in the ImageStream class
https://bugzilla.redhat.com/show_bug.cgi?id=1499905
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade mingw-poppler’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa ntp

Otkriveni su sigurnosni nedostaci u programskom paketu ntp za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanjem...

Close