Fedora alert FEDORA-2021-9de542ab4c (CGAL)
From: | updates@fedoraproject.org | |
To: | package-announce@lists.fedoraproject.org | |
Subject: | [SECURITY] Fedora 33 Update: CGAL-5.1.3-1.fc33 | |
Date: | Fri, 26 Mar 2021 17:55:29 +0000 | |
Message-ID: | <20210326175529.39D3F3072633@bastion01.iad2.fedoraproject.org> | |
Archive-link: | Article |
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-9de542ab4c 2021-03-26 17:52:06.072581 -------------------------------------------------------------------------------- Name : CGAL Product : Fedora 33 Version : 5.1.3 Release : 1.fc33 URL : http://www.cgal.org/ Summary : Computational Geometry Algorithms Library Description : Libraries for CGAL applications. CGAL is a collaborative effort of several sites in Europe and Israel. The goal is to make the most important of the solutions and methods developed in computational geometry available to users in industry and academia in a C++ library. The goal is to provide easy access to useful, reliable geometric algorithms. -------------------------------------------------------------------------------- Update Information: New upstream release CGAL-5.1.3. Security fix for CVE-2020-28601, CVE-2020-28636, CVE-2020-35628, CVE-2020-35636. -------------------------------------------------------------------------------- ChangeLog: * Wed Mar 17 2021 Laurent Rineau <laurent.rineau@cgal.org> - 5.1.3 - New upstream release -------------------------------------------------------------------------------- References: [ 1 ] Bug #1939901 - CVE-2020-28601 CGAL: ode execution vulnerability may lead to oob read https://bugzilla.redhat.com/show_bug.cgi?id=1939901 [ 2 ] Bug #1939904 - CVE-2020-28636 CGAL: code execution vulnerability may lead to oob read https://bugzilla.redhat.com/show_bug.cgi?id=1939904 [ 3 ] Bug #1939905 - CVE-2020-35628 CGAL: code execution vulnerability may lead to oob read https://bugzilla.redhat.com/show_bug.cgi?id=1939905 [ 4 ] Bug #1939906 - CVE-2020-35636 CGAL: code execution vulnerability may lead to oob read https://bugzilla.redhat.com/show_bug.cgi?id=1939906 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-9de542ab4c' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgr... All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-cond... List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-ann... Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure