– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201702-12
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Severity: Normal
Title: MuPDF: Multiple vulnerabilities
Date: February 19, 2017
Bugs: #589826, #590480, #608702, #608712
ID: 201702-12
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Synopsis
========
Multiple vulnerabilities have been found in MuPDF, the worst of which
allows remote attackers to execute arbitrary code.
Background
==========
A lightweight PDF, XPS, and E-book viewer.
Affected packages
=================
——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 app-text/mupdf < 1.10a-r1 >= 1.10a-r1
Description
===========
Multiple vulnerabilities have been discovered in MuPDF. Please review
the CVE identifiers referenced below for details.
Impact
======
A remote attacker could entice a user to open a specially crafted PDF
document using MuPDF possibly resulting in the execution of arbitrary
code, with the privileges of the process, or a Denial of Service
condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All MuPDF users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=app-text/mupdf-1.10a-r1”
References
==========
[ 1 ] CVE-2016-6265
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6265
[ 2 ] CVE-2016-6525
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6525
[ 3 ] CVE-2017-5896
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5896
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201702-12
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2.0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=eHaj
—–END PGP SIGNATURE—–