LWN.net Logo

Mageia alert MGASA-2013-0095 (poppler)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0095: poppler-0.18.4-2.1.mga2 (2/core)
Date:  Sat, 16 Mar 2013 22:44:43 +0100
Message-ID:  <20130316214443.GA5717@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0095 Date: March 16rd, 2013 Affected releases: 2 Media: Core Description: Updated poppler packages fix security vulnerabilities: Invalid memory access flaws in poppler before 0.22.1 (CVE-2013-1788). An uninitialized memory read flaw in poppler before 0.22.1 (CVE-2013-1790). Updated Packages: i586: libpoppler-qt4-3-0.18.4-2.1.mga2.i586 libpoppler-glib-devel-0.18.4-2.1.mga2.i586 libpoppler-cpp0-0.18.4-2.1.mga2.i586 libpoppler-glib8-0.18.4-2.1.mga2.i586 libpoppler-gir0.18-0.18.4-2.1.mga2.i586 libpoppler-qt4-devel-0.18.4-2.1.mga2.i586 libpoppler19-0.18.4-2.1.mga2.i586 poppler-0.18.4-2.1.mga2.i586 libpoppler-devel-0.18.4-2.1.mga2.i586 libpoppler-cpp-devel-0.18.4-2.1.mga2.i586 x86_64: poppler-0.18.4-2.1.mga2.x86_64 lib64poppler19-0.18.4-2.1.mga2.x86_64 lib64poppler-qt4-devel-0.18.4-2.1.mga2.x86_64 lib64poppler-glib-devel-0.18.4-2.1.mga2.x86_64 lib64poppler-devel-0.18.4-2.1.mga2.x86_64 lib64poppler-cpp-devel-0.18.4-2.1.mga2.x86_64 lib64poppler-glib8-0.18.4-2.1.mga2.x86_64 lib64poppler-gir0.18-0.18.4-2.1.mga2.x86_64 lib64poppler-cpp0-0.18.4-2.1.mga2.x86_64 lib64poppler-qt4-3-0.18.4-2.1.mga2.x86_64 SRPMS: poppler-0.18.4-2.1.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790 http://lists.fedoraproject.org/pipermail/package-announce... https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-... https://bugs.mageia.org/show_bug.cgi?id=9390


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds