You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mingw

Sigurnosni nedostaci programskog paketa mingw

——————————————————————————–
Fedora Update Notification
FEDORA-2017-93868169a0
2017-07-27 14:24:45.247039
——————————————————————————–

Name : mingw-poppler
Product : Fedora 24
Version : 0.41.0
Release : 3.fc24
URL : http://poppler.freedesktop.org/
Summary : MinGW Windows Poppler library
Description :
MinGW Windows Poppler library.

——————————————————————————–
Update Information:

This update fixes multiple security vulnerabilities (CVE-2017-7515,
CVE-2017-9775, CVE-2017-9776, CVE-2017-9865).
——————————————————————————–
References:

[ 1 ] Bug #1466442 – CVE-2017-9775 poppler: Stack-buffer overflow in GfxState.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1466442
[ 2 ] Bug #1466435 – CVE-2017-9865 poppler: Buffer over-read in the GfxImageColorMap::getGray function
https://bugzilla.redhat.com/show_bug.cgi?id=1466435
[ 3 ] Bug #1459066 – CVE-2017-7515 poppler: Stack exhaustion due to infinite recursive call in pdfunite
https://bugzilla.redhat.com/show_bug.cgi?id=1459066
[ 4 ] Bug #1466443 – CVE-2017-9776 poppler: Integer overflow in JBIG2Stream.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1466443
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade mingw-poppler’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2017-9fa2cefa7a
2017-07-27 14:25:19.487052
——————————————————————————–

Name : mingw-poppler
Product : Fedora 25
Version : 0.45.0
Release : 3.fc25
URL : http://poppler.freedesktop.org/
Summary : MinGW Windows Poppler library
Description :
MinGW Windows Poppler library.

——————————————————————————–
Update Information:

This update fixes multiple security vulnerabilities (CVE-2017-7515,
CVE-2017-9775, CVE-2017-9776, CVE-2017-9865).
——————————————————————————–
References:

[ 1 ] Bug #1466442 – CVE-2017-9775 poppler: Stack-buffer overflow in GfxState.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1466442
[ 2 ] Bug #1466435 – CVE-2017-9865 poppler: Buffer over-read in the GfxImageColorMap::getGray function
https://bugzilla.redhat.com/show_bug.cgi?id=1466435
[ 3 ] Bug #1459066 – CVE-2017-7515 poppler: Stack exhaustion due to infinite recursive call in pdfunite
https://bugzilla.redhat.com/show_bug.cgi?id=1459066
[ 4 ] Bug #1466443 – CVE-2017-9776 poppler: Integer overflow in JBIG2Stream.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1466443
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade mingw-poppler’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2017-bbb664e0a0
2017-07-27 14:26:19.255104
——————————————————————————–

Name : mingw-poppler
Product : Fedora 26
Version : 0.52.0
Release : 3.fc26
URL : http://poppler.freedesktop.org/
Summary : MinGW Windows Poppler library
Description :
MinGW Windows Poppler library.

——————————————————————————–
Update Information:

This update fixes multiple security vulnerabilities (CVE-2017-7515,
CVE-2017-9775, CVE-2017-9776, CVE-2017-9865).
——————————————————————————–
References:

[ 1 ] Bug #1466442 – CVE-2017-9775 poppler: Stack-buffer overflow in GfxState.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1466442
[ 2 ] Bug #1466435 – CVE-2017-9865 poppler: Buffer over-read in the GfxImageColorMap::getGray function
https://bugzilla.redhat.com/show_bug.cgi?id=1466435
[ 3 ] Bug #1459066 – CVE-2017-7515 poppler: Stack exhaustion due to infinite recursive call in pdfunite
https://bugzilla.redhat.com/show_bug.cgi?id=1459066
[ 4 ] Bug #1466443 – CVE-2017-9776 poppler: Integer overflow in JBIG2Stream.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1466443
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade mingw-poppler’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa golang

Otkriven je sigurnosni nedostatak u programskom paketu golang za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje otkrivanje osjetljivih informacija....

Close