Script_set_attribute(attribute:"synopsis", value: Script_set_attribute(attribute:"plugin_modification_date", value:"5") # extracted from Red Hat Security Advisory RHSA-2018:3140. # The descriptive text and package checks in this plugin were Red Hat would like to thank chenyuan (NESA Lab) for reporting CVE-2018-10733 and CVE-2018-10767 and Hosein Askari for reporting CVE-2018-13988.įor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section. Poppler: out of bounds read in pdfunite (CVE-2018-13988)įor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Poppler: NULL pointer dereference in Annot.h:AnnotPath::getCoordsLength() allows for denial of service via crafted PDF (CVE-2018-10768) Libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c (CVE-2018-10767) Libgxps: heap based buffer over read in ft_font_face_hash function of gxps-fonts.c (CVE-2018-10733) Poppler: Infinite recursion in fofi/:FoFiType1C::cvtGlyph() function allows denial of service (CVE-2017-18267) Libsoup: Crash in soup_cookie_jar.c:get_cookies() on empty hostnames (CVE-2018-12910) GNOME is the default desktop environment of Red Hat Enterprise Linux. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat Product Security has rated this update as having a security impact of Moderate. An update is now available for Red Hat Enterprise Linux 7.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |