Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
564d13f7 by Salvatore Bonaccorso at 2019-07-07T15:42:01Z
Add fixed version for two CVEs affecting mupdf in unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -216,7 +216,7 @@ CVE-2019-13292 (A SQL Injection issue was discovered in 
webERP 4.15. Payments.ph
 CVE-2019-13291 (In Xpdf 4.01.01, there is a heap-based buffer over-read in the 
functio ...)
        - xpdf <not-affected> (xpdf in Debian uses poppler, which is fixed)
 CVE-2019-13290 (Artifex MuPDF 1.15.0 has a heap-based buffer overflow in 
fz_append_dis ...)
-       - mupdf <unfixed> (bug #931475)
+       - mupdf 1.15.0+ds1-1 (bug #931475)
        [jessie] - mupdf <not-affected> (Vulnerable code introduced later)
        NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=701118
        NOTE: 
http://git.ghostscript.com/?p=mupdf.git;h=aaf794439e40a2ef544f15b50c20e657414dec7a
@@ -31953,7 +31953,7 @@ CVE-2018-19779
 CVE-2018-19778
        RESERVED
 CVE-2018-19777 (In Artifex MuPDF 1.14.0, there is an infinite loop in the 
function svg ...)
-       - mupdf <unfixed> (unimportant; bug #915137)
+       - mupdf 1.15.0+ds1-1 (unimportant; bug #915137)
        NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=700301
        NOTE: No security impact, hang in GUI/CLI tool
 CVE-2018-19776



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/564d13f7372bdbfc82e9512d23c77e82eb289c0b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/564d13f7372bdbfc82e9512d23c77e82eb289c0b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to