--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2021-9de542ab4c
2021-03-26 17:52:06.072581
--------------------------------------------------------------------------------Name        : CGAL
Product     : Fedora 33
Version     : 5.1.3
Release     : 1.fc33
URL         : https://www.cgal.org/
Summary     : Computational Geometry Algorithms Library
Description :
Libraries for CGAL applications.
CGAL is a collaborative effort of several sites in Europe and
Israel. The goal is to make the most important of the solutions and
methods developed in computational geometry available to users in
industry and academia in a C++ library. The goal is to provide easy
access to useful, reliable geometric algorithms.

--------------------------------------------------------------------------------Update Information:

New upstream release CGAL-5.1.3.  Security fix for CVE-2020-28601,
CVE-2020-28636, CVE-2020-35628, CVE-2020-35636.
--------------------------------------------------------------------------------ChangeLog:

* Wed Mar 17 2021 Laurent Rineau  - 5.1.3
- New upstream release
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1939901 - CVE-2020-28601 CGAL: ode execution vulnerability may lead to oob read
        https://bugzilla.redhat.com/show_bug.cgi?id=1939901
  [ 2 ] Bug #1939904 - CVE-2020-28636 CGAL: code execution vulnerability may lead to oob read
        https://bugzilla.redhat.com/show_bug.cgi?id=1939904
  [ 3 ] Bug #1939905 - CVE-2020-35628 CGAL: code execution vulnerability may lead to oob read
        https://bugzilla.redhat.com/show_bug.cgi?id=1939905
  [ 4 ] Bug #1939906 - CVE-2020-35636 CGAL: code execution vulnerability may lead to oob read
        https://bugzilla.redhat.com/show_bug.cgi?id=1939906
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-9de542ab4c' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 33: CGAL 2021-9de542ab4c

March 26, 2021
New upstream release CGAL-5.1.3

Summary

Libraries for CGAL applications.

CGAL is a collaborative effort of several sites in Europe and

Israel. The goal is to make the most important of the solutions and

methods developed in computational geometry available to users in

industry and academia in a C++ library. The goal is to provide easy

access to useful, reliable geometric algorithms.

New upstream release CGAL-5.1.3. Security fix for CVE-2020-28601,

CVE-2020-28636, CVE-2020-35628, CVE-2020-35636.

* Wed Mar 17 2021 Laurent Rineau - 5.1.3

- New upstream release

[ 1 ] Bug #1939901 - CVE-2020-28601 CGAL: ode execution vulnerability may lead to oob read

https://bugzilla.redhat.com/show_bug.cgi?id=1939901

[ 2 ] Bug #1939904 - CVE-2020-28636 CGAL: code execution vulnerability may lead to oob read

https://bugzilla.redhat.com/show_bug.cgi?id=1939904

[ 3 ] Bug #1939905 - CVE-2020-35628 CGAL: code execution vulnerability may lead to oob read

https://bugzilla.redhat.com/show_bug.cgi?id=1939905

[ 4 ] Bug #1939906 - CVE-2020-35636 CGAL: code execution vulnerability may lead to oob read

https://bugzilla.redhat.com/show_bug.cgi?id=1939906

su -c 'dnf upgrade --advisory FEDORA-2021-9de542ab4c' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

FEDORA-2021-9de542ab4c 2021-03-26 17:52:06.072581 Product : Fedora 33 Version : 5.1.3 Release : 1.fc33 URL : https://www.cgal.org/ Summary : Computational Geometry Algorithms Library Description : Libraries for CGAL applications. CGAL is a collaborative effort of several sites in Europe and Israel. The goal is to make the most important of the solutions and methods developed in computational geometry available to users in industry and academia in a C++ library. The goal is to provide easy access to useful, reliable geometric algorithms. New upstream release CGAL-5.1.3. Security fix for CVE-2020-28601, CVE-2020-28636, CVE-2020-35628, CVE-2020-35636. * Wed Mar 17 2021 Laurent Rineau - 5.1.3 - New upstream release [ 1 ] Bug #1939901 - CVE-2020-28601 CGAL: ode execution vulnerability may lead to oob read https://bugzilla.redhat.com/show_bug.cgi?id=1939901 [ 2 ] Bug #1939904 - CVE-2020-28636 CGAL: code execution vulnerability may lead to oob read https://bugzilla.redhat.com/show_bug.cgi?id=1939904 [ 3 ] Bug #1939905 - CVE-2020-35628 CGAL: code execution vulnerability may lead to oob read https://bugzilla.redhat.com/show_bug.cgi?id=1939905 [ 4 ] Bug #1939906 - CVE-2020-35636 CGAL: code execution vulnerability may lead to oob read https://bugzilla.redhat.com/show_bug.cgi?id=1939906 su -c 'dnf upgrade --advisory FEDORA-2021-9de542ab4c' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/ Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Change Log

References

Update Instructions

Severity
Product : Fedora 33
Version : 5.1.3
Release : 1.fc33
URL : https://www.cgal.org/
Summary : Computational Geometry Algorithms Library

Related News