--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2018-26fcc67bfd
2018-06-01 12:19:10.901646
--------------------------------------------------------------------------------
Name : poppler
Product : Fedora 27
Version : 0.57.0
Release : 9.fc27
URL :
http://poppler.freedesktop.org/
Summary : PDF rendering library
Description :
poppler is a PDF rendering library.
--------------------------------------------------------------------------------
Update Information:
Security fix for CVE-2017-18267.
--------------------------------------------------------------------------------
ChangeLog:
* Mon May 28 2018 Marek Kasik <mkasik(a)redhat.com> - 0.57.0-9
- Fix infinite recursion (CVE-2017-18267)
- Resolves: #1578780
* Tue Jan 16 2018 Caol��n McNamara <caolanm(a)redhat.com> - 0.57.0-8
- Resolves: rhbz#1534706 unable to open some valid pdf files
* Fri Jan 5 2018 David Tardon <dtardon(a)redhat.com> - 0.57.0-7
- Resolves: rhbz#1531383 CVE-2017-1000456 Invalid read in TextPool::addWord()
causes crash and can lead to overflow in subsequent calculations
* Thu Nov 9 2017 David Tardon <dtardon(a)redhat.com> - 0.57.0-6
- Resolves: rhbz#1510980 CVE-2017-15565
* Wed Oct 11 2017 David Tardon <dtardon(a)redhat.com> - 0.57.0-5
- Resolves: rhbz#1500326 CVE-2017-14926 CVE-2017-14927 CVE-2017-14928
* Tue Oct 10 2017 David Tardon <dtardon(a)redhat.com> - 0.57.0-4
- Resolves: rhbz#1499906 CVE-2017-14617
* Sun Oct 8 2017 David Tardon <dtardon(a)redhat.com> - 0.57.0-3
- Resolves: rhbz#1499168 CVE-2017-14517 CVE-2017-14518 CVE-2017-14519
CVE-2017-14929
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1578777 - CVE-2017-18267 poppler: Infinite recursion in
fofi/FoFiType1C.cc:FoFiType1C::cvtGlyph() function allows denial of service
https://bugzilla.redhat.com/show_bug.cgi?id=1578777
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-26fcc67bfd' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------