Mehrere Probleme in MuPDF
ID: | FEDORA-2018-da6f76b446 |
Distribution: | Fedora |
Plattformen: | Fedora 27 |
Datum: | Do, 22. Februar 2018, 18:20 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6544
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000051 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6187 |
Applikationen: | MuPDF |
Originalnachricht |
|
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2018-da6f76b446 2018-02-22 14:53:38.227930 -------------------------------------------------------------------------------- Name : mupdf Product : Fedora 27 Version : 1.12.0 Release : 5.fc27 URL : http://mupdf.com/ Summary : A lightweight PDF viewer and toolkit Description : MuPDF is a lightweight PDF viewer and toolkit written in portable C. The renderer in MuPDF is tailored for high quality anti-aliased graphics. MuPDF renders text with metrics and spacing accurate to within fractions of a pixel for the highest fidelity in reproducing the look of a printed page on screen. MuPDF has a small footprint. A binary that includes the standard Roman fonts is only one megabyte. A build with full CJK support (including an Asian font) is approximately five megabytes. MuPDF has support for all non-interactive PDF 1.7 features, and the toolkit provides a simple API for accessing the internal structures of the PDF document. Example code for navigating interactive links and bookmarks, encrypting PDF files, extracting fonts, images, and searchable text, and rendering pages to image files is provided. -------------------------------------------------------------------------------- Update Information: CVE-2018-6192 CVE-2018-6544 CVE-2018-1000051 CVE-2018-6187 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1539845 - CVE-2018-6192 mupdf: Segment violation in pdf_read_new_xref function in pdf/pdf-xref.c https://bugzilla.redhat.com/show_bug.cgi?id=1539845 [ 2 ] Bug #1542264 - CVE-2018-6544 mupdf: denial of service (DoS) via a crafted PDF document https://bugzilla.redhat.com/show_bug.cgi?id=1542264 [ 3 ] Bug #1544847 - CVE-2018-1000051 mupdf: use-after-free in fz_keep_key_storable function https://bugzilla.redhat.com/show_bug.cgi?id=1544847 [ 4 ] Bug #1538432 - CVE-2018-6187 mupdf: heap-based buffer overflow in pdf/pdf-write.c:do_pdf_save_document() https://bugzilla.redhat.com/show_bug.cgi?id=1538432 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade mupdf' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org |