[Git][security-tracker-team/security-tracker][master] 2 commits: CVE-2019-13290/mupdf: jessie triage
Sylvain Beucler
beuc at debian.org
Sat Jul 6 12:43:38 BST 2019
Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker
Commits:
44618ae5 by Sylvain Beucler at 2019-07-06T11:15:36Z
CVE-2019-13290/mupdf: jessie triage
- - - - -
45d49679 by Sylvain Beucler at 2019-07-06T11:41:55Z
CVE-2019-13351/jackd2: jessie triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -18,6 +18,7 @@ CVE-2019-13352 (WolfVision Cynap before 1.30j uses a static, hard-coded cryptogr
TODO: check
CVE-2019-13351 (posix/JackSocket.cpp in libjack in JACK2 1.9.1 through 1.9.12 (as dist ...)
- jackd2 <unfixed> (bug #931488)
+ [jessie] - jessie <postponed> (Minor issue, hard to reproduce crash with theoretically possible file corruption, no sensitive data to leak)
NOTE: https://github.com/jackaudio/jack2/pull/480
NOTE: https://github.com/jackaudio/jack2/commit/994e225bbb07a89f56147f7ce7d59beb49f8cfba
CVE-2019-13350
@@ -186,9 +187,11 @@ CVE-2019-13291 (In Xpdf 4.01.01, there is a heap-based buffer over-read in the f
- xpdf <not-affected> (xpdf in Debian uses poppler, which is fixed)
CVE-2019-13290 (Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_dis ...)
- mupdf <unfixed> (bug #931475)
+ [jessie] - mupdf <not-affected>
NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=701118
NOTE: http://git.ghostscript.com/?p=mupdf.git;h=aaf794439e40a2ef544f15b50c20e657414dec7a
NOTE: http://git.ghostscript.com/?p=mupdf.git;h=ed19bc806809ad10c4ddce515d375581b86ede85
+ NOTE: Introduced in 1.6 / http://git.ghostscript.com/?p=mupdf.git;a=commit;f=source/fitz/list-device.c;h=e9411aba2b71b67b8521f55917ab26585c464b88
CVE-2019-13289 (In Xpdf 4.01.01, there is a use-after-free vulnerability in the functi ...)
- xpdf <not-affected> (xpdf in Debian uses poppler, which is fixed)
CVE-2019-13288 (In Xpdf 4.01.01, the Parser::getObj() function in Parser.cc may cause ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/08c69d162bebd6cf7421a995b84fba39dc866c3d...45d49679a797a7da7125ef8d0da2f5aed561093f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/08c69d162bebd6cf7421a995b84fba39dc866c3d...45d49679a797a7da7125ef8d0da2f5aed561093f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190706/0e1f491b/attachment.html>
More information about the debian-security-tracker-commits
mailing list