Fedora 26: mingw-poppler Security Update 2017-a0ffdf1fbd
Summary
MinGW Windows Poppler library.
This update fixes the following security vulnerabilities: - CVE-2017-14517 -CVE-2017-14518 - CVE-2017-14519 - CVE-2017-14617 - CVE-2017-14926 -CVE-2017-14927 - CVE-2017-14928 - CVE-2017-14929 - CVE-2017-14975 and
CVE-2017-14976 - CVE-2017-14977
[ 1 ] Bug #1500345 - CVE-2017-14976 poppler: Heap-based buffer over-read in the FoFiType1C::convertToType0 function
https://bugzilla.redhat.com/show_bug.cgi?id=1500345
[ 2 ] Bug #1500344 - CVE-2017-14977 poppler: NULL pointer dereference in the FoFiTrueType::getCFFBlock function
https://bugzilla.redhat.com/show_bug.cgi?id=1500344
[ 3 ] Bug #1500343 - CVE-2017-14975 poppler: NULL pointer dereference in the FoFiType1C::convertToType0 function
https://bugzilla.redhat.com/show_bug.cgi?id=1500343
[ 4 ] Bug #1499167 - CVE-2017-14929 poppler: Memory corruption via Gfx.cc infinite loop
https://bugzilla.redhat.com/show_bug.cgi?id=1499167
[ 5 ] Bug #1499165 - CVE-2017-14519 poppler: Memory corruption via Gfx.cc infinite loop
https://bugzilla.redhat.com/show_bug.cgi?id=1499165
[ 6 ] Bug #1499163 - CVE-2017-14518 poppler: Floating point exception in the isImageInterpolationRequired() function
https://bugzilla.redhat.com/show_bug.cgi?id=1499163
[ 7 ] Bug #1499162 - CVE-2017-14517 poppler: NULL pointer dereference in the XRef::parseEntry() function
https://bugzilla.redhat.com/show_bug.cgi?id=1499162
[ 8 ] Bug #1499905 - CVE-2017-14617 poppler: Floating point exception in the ImageStream class
https://bugzilla.redhat.com/show_bug.cgi?id=1499905
su -c 'dnf upgrade mingw-poppler' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
FEDORA-2017-a0ffdf1fbd 2017-10-25 21:34:15.278583 Product : Fedora 26 Version : 0.52.0 Release : 5.fc26 URL : http://poppler.freedesktop.org/ Summary : MinGW Windows Poppler library Description : MinGW Windows Poppler library. This update fixes the following security vulnerabilities: - CVE-2017-14517 -CVE-2017-14518 - CVE-2017-14519 - CVE-2017-14617 - CVE-2017-14926 -CVE-2017-14927 - CVE-2017-14928 - CVE-2017-14929 - CVE-2017-14975 and CVE-2017-14976 - CVE-2017-14977 [ 1 ] Bug #1500345 - CVE-2017-14976 poppler: Heap-based buffer over-read in the FoFiType1C::convertToType0 function https://bugzilla.redhat.com/show_bug.cgi?id=1500345 [ 2 ] Bug #1500344 - CVE-2017-14977 poppler: NULL pointer dereference in the FoFiTrueType::getCFFBlock function https://bugzilla.redhat.com/show_bug.cgi?id=1500344 [ 3 ] Bug #1500343 - CVE-2017-14975 poppler: NULL pointer dereference in the FoFiType1C::convertToType0 function https://bugzilla.redhat.com/show_bug.cgi?id=1500343 [ 4 ] Bug #1499167 - CVE-2017-14929 poppler: Memory corruption via Gfx.cc infinite loop https://bugzilla.redhat.com/show_bug.cgi?id=1499167 [ 5 ] Bug #1499165 - CVE-2017-14519 poppler: Memory corruption via Gfx.cc infinite loop https://bugzilla.redhat.com/show_bug.cgi?id=1499165 [ 6 ] Bug #1499163 - CVE-2017-14518 poppler: Floating point exception in the isImageInterpolationRequired() function https://bugzilla.redhat.com/show_bug.cgi?id=1499163 [ 7 ] Bug #1499162 - CVE-2017-14517 poppler: NULL pointer dereference in the XRef::parseEntry() function https://bugzilla.redhat.com/show_bug.cgi?id=1499162 [ 8 ] Bug #1499905 - CVE-2017-14617 poppler: Floating point exception in the ImageStream class https://bugzilla.redhat.com/show_bug.cgi?id=1499905 su -c 'dnf upgrade mingw-poppler' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Change Log
References