--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2017-a0ffdf1fbd
2017-10-25 21:34:15.278583
--------------------------------------------------------------------------------Name        : mingw-poppler
Product     : Fedora 26
Version     : 0.52.0
Release     : 5.fc26
URL         : http://poppler.freedesktop.org/
Summary     : MinGW Windows Poppler library
Description :
MinGW Windows Poppler library.

--------------------------------------------------------------------------------Update Information:

This update fixes the following security vulnerabilities: - CVE-2017-14517 -CVE-2017-14518 - CVE-2017-14519  - CVE-2017-14617 - CVE-2017-14926 -CVE-2017-14927 - CVE-2017-14928 - CVE-2017-14929 - CVE-2017-14975 and
CVE-2017-14976 - CVE-2017-14977
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1500345 - CVE-2017-14976 poppler: Heap-based buffer over-read in the FoFiType1C::convertToType0 function
        https://bugzilla.redhat.com/show_bug.cgi?id=1500345
  [ 2 ] Bug #1500344 - CVE-2017-14977 poppler: NULL pointer dereference in the FoFiTrueType::getCFFBlock function
        https://bugzilla.redhat.com/show_bug.cgi?id=1500344
  [ 3 ] Bug #1500343 - CVE-2017-14975 poppler: NULL pointer dereference in the FoFiType1C::convertToType0 function
        https://bugzilla.redhat.com/show_bug.cgi?id=1500343
  [ 4 ] Bug #1499167 - CVE-2017-14929 poppler: Memory corruption via Gfx.cc infinite loop
        https://bugzilla.redhat.com/show_bug.cgi?id=1499167
  [ 5 ] Bug #1499165 - CVE-2017-14519 poppler: Memory corruption via Gfx.cc infinite loop
        https://bugzilla.redhat.com/show_bug.cgi?id=1499165
  [ 6 ] Bug #1499163 - CVE-2017-14518 poppler: Floating point exception in the isImageInterpolationRequired() function
        https://bugzilla.redhat.com/show_bug.cgi?id=1499163
  [ 7 ] Bug #1499162 - CVE-2017-14517 poppler: NULL pointer dereference in the XRef::parseEntry() function
        https://bugzilla.redhat.com/show_bug.cgi?id=1499162
  [ 8 ] Bug #1499905 - CVE-2017-14617 poppler: Floating point exception in the ImageStream class
        https://bugzilla.redhat.com/show_bug.cgi?id=1499905
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade mingw-poppler' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora 26: mingw-poppler Security Update 2017-a0ffdf1fbd

October 25, 2017
This update fixes the following security vulnerabilities: - CVE-2017-14517 - CVE-2017-14518 - CVE-2017-14519 - CVE-2017-14617 - CVE-2017-14926 - CVE-2017-14927 - CVE-2017-14928 - C...

Summary

MinGW Windows Poppler library.

This update fixes the following security vulnerabilities: - CVE-2017-14517 -CVE-2017-14518 - CVE-2017-14519 - CVE-2017-14617 - CVE-2017-14926 -CVE-2017-14927 - CVE-2017-14928 - CVE-2017-14929 - CVE-2017-14975 and

CVE-2017-14976 - CVE-2017-14977

[ 1 ] Bug #1500345 - CVE-2017-14976 poppler: Heap-based buffer over-read in the FoFiType1C::convertToType0 function

https://bugzilla.redhat.com/show_bug.cgi?id=1500345

[ 2 ] Bug #1500344 - CVE-2017-14977 poppler: NULL pointer dereference in the FoFiTrueType::getCFFBlock function

https://bugzilla.redhat.com/show_bug.cgi?id=1500344

[ 3 ] Bug #1500343 - CVE-2017-14975 poppler: NULL pointer dereference in the FoFiType1C::convertToType0 function

https://bugzilla.redhat.com/show_bug.cgi?id=1500343

[ 4 ] Bug #1499167 - CVE-2017-14929 poppler: Memory corruption via Gfx.cc infinite loop

https://bugzilla.redhat.com/show_bug.cgi?id=1499167

[ 5 ] Bug #1499165 - CVE-2017-14519 poppler: Memory corruption via Gfx.cc infinite loop

https://bugzilla.redhat.com/show_bug.cgi?id=1499165

[ 6 ] Bug #1499163 - CVE-2017-14518 poppler: Floating point exception in the isImageInterpolationRequired() function

https://bugzilla.redhat.com/show_bug.cgi?id=1499163

[ 7 ] Bug #1499162 - CVE-2017-14517 poppler: NULL pointer dereference in the XRef::parseEntry() function

https://bugzilla.redhat.com/show_bug.cgi?id=1499162

[ 8 ] Bug #1499905 - CVE-2017-14617 poppler: Floating point exception in the ImageStream class

https://bugzilla.redhat.com/show_bug.cgi?id=1499905

su -c 'dnf upgrade mingw-poppler' at the command line.

For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

FEDORA-2017-a0ffdf1fbd 2017-10-25 21:34:15.278583 Product : Fedora 26 Version : 0.52.0 Release : 5.fc26 URL : http://poppler.freedesktop.org/ Summary : MinGW Windows Poppler library Description : MinGW Windows Poppler library. This update fixes the following security vulnerabilities: - CVE-2017-14517 -CVE-2017-14518 - CVE-2017-14519 - CVE-2017-14617 - CVE-2017-14926 -CVE-2017-14927 - CVE-2017-14928 - CVE-2017-14929 - CVE-2017-14975 and CVE-2017-14976 - CVE-2017-14977 [ 1 ] Bug #1500345 - CVE-2017-14976 poppler: Heap-based buffer over-read in the FoFiType1C::convertToType0 function https://bugzilla.redhat.com/show_bug.cgi?id=1500345 [ 2 ] Bug #1500344 - CVE-2017-14977 poppler: NULL pointer dereference in the FoFiTrueType::getCFFBlock function https://bugzilla.redhat.com/show_bug.cgi?id=1500344 [ 3 ] Bug #1500343 - CVE-2017-14975 poppler: NULL pointer dereference in the FoFiType1C::convertToType0 function https://bugzilla.redhat.com/show_bug.cgi?id=1500343 [ 4 ] Bug #1499167 - CVE-2017-14929 poppler: Memory corruption via Gfx.cc infinite loop https://bugzilla.redhat.com/show_bug.cgi?id=1499167 [ 5 ] Bug #1499165 - CVE-2017-14519 poppler: Memory corruption via Gfx.cc infinite loop https://bugzilla.redhat.com/show_bug.cgi?id=1499165 [ 6 ] Bug #1499163 - CVE-2017-14518 poppler: Floating point exception in the isImageInterpolationRequired() function https://bugzilla.redhat.com/show_bug.cgi?id=1499163 [ 7 ] Bug #1499162 - CVE-2017-14517 poppler: NULL pointer dereference in the XRef::parseEntry() function https://bugzilla.redhat.com/show_bug.cgi?id=1499162 [ 8 ] Bug #1499905 - CVE-2017-14617 poppler: Floating point exception in the ImageStream class https://bugzilla.redhat.com/show_bug.cgi?id=1499905 su -c 'dnf upgrade mingw-poppler' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 26
Version : 0.52.0
Release : 5.fc26
URL : http://poppler.freedesktop.org/
Summary : MinGW Windows Poppler library

Related News