You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mupdf

Sigurnosni nedostaci programskog paketa mupdf

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2017-9a819664a6
2017-03-07 09:11:32.835174
——————————————————————————–

Name : mupdf
Product : Fedora 25
Version : 1.10a
Release : 4.fc25
URL : http://mupdf.com/
Summary : A lightweight PDF viewer and toolkit
Description :
MuPDF is a lightweight PDF viewer and toolkit written in portable C.
The renderer in MuPDF is tailored for high quality anti-aliased
graphics. MuPDF renders text with metrics and spacing accurate to
within fractions of a pixel for the highest fidelity in reproducing
the look of a printed page on screen.
MuPDF has a small footprint. A binary that includes the standard
Roman fonts is only one megabyte. A build with full CJK support
(including an Asian font) is approximately five megabytes.
MuPDF has support for all non-interactive PDF 1.7 features, and the
toolkit provides a simple API for accessing the internal structures of
the PDF document. Example code for navigating interactive links and
bookmarks, encrypting PDF files, extracting fonts, images, and
searchable text, and rendering pages to image files is provided.

——————————————————————————–
Update Information:

Security fix for CVE-2017-6060 CVE-2017-5896 —- Add comment with explanation
of disabled debuginfo
——————————————————————————–
References:

[ 1 ] Bug #1425338 – CVE-2017-6060 mupdf: Stack-based buffer overflow in jstest_main.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1425338
[ 2 ] Bug #1424762 – Install size is too big
https://bugzilla.redhat.com/show_bug.cgi?id=1424762
[ 3 ] Bug #1363695 – CVE-2016-6525 CVE-2016-8674 CVE-2017-5896 mupdf: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1363695
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade mupdf’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-03-0053-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa texlive

Otkriven je sigurnosni nedostatak u programskom paketu texlive za operacijski sustav Debian. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close