[ALSA-2020:4643] Low: poppler security update
Type:
security
Severity:
low
Release date:
2021-08-11
Description:
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: divide-by-zero in function SplashOutputDev::tilingPatternFill in SplashOutputDev.cc (CVE-2019-14494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
References:
Updated packages listed below:
Architecture Package Checksum
i686 poppler-cpp-0.66.0-27.el8.i686.rpm 1d17317df6955ad54e4981f6d11142dddc6bbe09d90084ca21617b3d14b2471b
i686 poppler-devel-0.66.0-27.el8.i686.rpm 4835b664b5220a4b1fe1a8b81e4cbedbfa16107557fe661fd112d7e6f1d04629
i686 poppler-glib-devel-0.66.0-27.el8.i686.rpm 4952f293318c86b2ede65081f7f7d0fd3395ba7c55225c45a097061bd42e5e69
i686 poppler-qt5-0.66.0-27.el8.i686.rpm 5d090f674d6776a1e5502351a2c7f31aa12677614349552fca193f152332fcca
i686 poppler-qt5-devel-0.66.0-27.el8.i686.rpm 9f97a36291102b2450cf51c4238a08a205feac098428c234533818c3f788d082
i686 poppler-cpp-devel-0.66.0-27.el8.i686.rpm fda0eec2b1b946486170a0e991136b0e9607aaf0a83ea0ed9b7bc2895f5bb61a
x86_64 poppler-qt5-devel-0.66.0-27.el8.x86_64.rpm 0a54aaebcb16c3726517fcc21d5140a6a25d40faa4463ea9279239d64f4bdc8f
x86_64 poppler-cpp-devel-0.66.0-27.el8.x86_64.rpm 138252dc01eac0a7ddac61f47d7cefdab6013f24dce1c2badd190db55b294a74
x86_64 poppler-qt5-0.66.0-27.el8.x86_64.rpm 909f7db56d8dafdc8bf306b507b1cf48a8cda4a288ece7ded3ef311588e44e3e
x86_64 poppler-glib-devel-0.66.0-27.el8.x86_64.rpm a35c18f4568325762630a8dfde07a12974df3c28821a2ee32af25ee5b913762e
x86_64 poppler-devel-0.66.0-27.el8.x86_64.rpm b924bce1901c9dbca3f2cd4a0042d20772f2a24601d4a05ed460a21a9f9b8514
x86_64 poppler-cpp-0.66.0-27.el8.x86_64.rpm d4212873588c2032ed25a7fbb12a25d4c79467dd2076f32127e8207225122d9d
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.