Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in MuPDF
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in MuPDF
ID: 201702-12
Distribution: Gentoo
Plattformen: Keine Angabe
Datum: So, 19. Februar 2017, 17:25
Referenzen: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6265
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6525
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5896
Applikationen: MuPDF

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--D2ae6hV6mnOwNvsFAMdOdOLuwhkrqn6ad
Content-Type: multipart/mixed;
boundary="SOUkjTn8b7jo7ow0H6Cwm8HAJCjaRpMjo";
protected-headers="v1"
From: Thomas Deutschmann <whissi@gentoo.org>
Reply-To: security@gentoo.org
To: gentoo-announce@lists.gentoo.org
Message-ID: <7357e1bc-8545-5cfc-aace-59422bb54240@gentoo.org>
Subject: [ GLSA 201702-12 ] MuPDF: Multiple vulnerabilities

--SOUkjTn8b7jo7ow0H6Cwm8HAJCjaRpMjo
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201702-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: MuPDF: Multiple vulnerabilities
Date: February 19, 2017
Bugs: #589826, #590480, #608702, #608712
ID: 201702-12

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in MuPDF, the worst of which
allows remote attackers to execute arbitrary code.

Background
==========

A lightweight PDF, XPS, and E-book viewer.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-text/mupdf < 1.10a-r1 >= 1.10a-r1

Description
===========

Multiple vulnerabilities have been discovered in MuPDF. Please review
the CVE identifiers referenced below for details.

Impact
======

A remote attacker could entice a user to open a specially crafted PDF
document using MuPDF possibly resulting in the execution of arbitrary
code, with the privileges of the process, or a Denial of Service
condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All MuPDF users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/mupdf-1.10a-r1"

References
==========

[ 1 ] CVE-2016-6265
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6265
[ 2 ] CVE-2016-6525
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6525
[ 3 ] CVE-2017-5896
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5896

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201702-12

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


--SOUkjTn8b7jo7ow0H6Cwm8HAJCjaRpMjo--

--D2ae6hV6mnOwNvsFAMdOdOLuwhkrqn6ad
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0

iQJ8BAEBCgBmBQJYqZQdXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQzM0M1ODQ4MkM0MDIyOTJEMkUzQzVDMDY5
NzA5RjkwQzNDOTZGRkM4AAoJEJcJ+Qw8lv/IAh8P/3H95w3CFI6hYe+F00J6IFPr
DAGsy6A7/VPVE7VEjQ3OAcqaFOc4YhTc9lRCqMROKH5IGwQMDinRujHucNnDi+Hs
zti+vdb3nm9EVrRJJTnfq22kb9/bwnDzHydtc6bUijp3Tmi9wb/GvgynGK3I5LUB
07WTsSSuzI+mR3jJrVMXqbn/BmG5yvlBo81toKCQU4Dw6YLP0NchlUspy+HjpBjH
dxqJ3w1kNOusiJjdbzp4MMEic3SS3yN3P9gsy9QqKmPAgEW/hm7RIWhaihGxJ/5Z
u3dl08EwbfDIuzfmFWEP1oFVsvGsrXsElob4tguQxXUJraIz6pUhrdZDO1ZLb2wQ
yZLWlBPPYpDuQcaHwOKjuwrL45Uvetxtnak2pLADAu7cbk55ueVqfYfVqPZ8YF6x
wiI61RsBKrFeB+icoGhxR93VF+yGf42bTXfbuWgQVqqw9kkm1XzBfRRpm1xw5eBU
J9p4VGfN4J8MqlybNjoYcfLt+8L/Ls8Sx93ZQ339ODEUmdoATLv6ltaMEVrtjfda
gaL+57sIN9HX+nGfpIj9S2+B7yvl0EIddQWxEhizTGBf2Scl4v44/8K7qqTrx32w
PuoEmjqIzgkkaUCdPE4DWbdUNEqd/BhVxtH3Sv7LrhBIezuRdHbwFqstwY56dVOC
qLxQtXbFYEcwKLTgwshT
=eHaj
-----END PGP SIGNATURE-----

--D2ae6hV6mnOwNvsFAMdOdOLuwhkrqn6ad--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung