[Git][security-tracker-team/security-tracker][master] 2 commits: CVE-2019-13290/mupdf: jessie triage

Sylvain Beucler beuc at debian.org
Sat Jul 6 12:43:38 BST 2019



Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker


Commits:
44618ae5 by Sylvain Beucler at 2019-07-06T11:15:36Z
CVE-2019-13290/mupdf: jessie triage

- - - - -
45d49679 by Sylvain Beucler at 2019-07-06T11:41:55Z
CVE-2019-13351/jackd2: jessie triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -18,6 +18,7 @@ CVE-2019-13352 (WolfVision Cynap before 1.30j uses a static, hard-coded cryptogr
 	TODO: check
 CVE-2019-13351 (posix/JackSocket.cpp in libjack in JACK2 1.9.1 through 1.9.12 (as dist ...)
 	- jackd2 <unfixed> (bug #931488)
+	[jessie] - jessie <postponed> (Minor issue, hard to reproduce crash with theoretically possible file corruption, no sensitive data to leak)
 	NOTE: https://github.com/jackaudio/jack2/pull/480
 	NOTE: https://github.com/jackaudio/jack2/commit/994e225bbb07a89f56147f7ce7d59beb49f8cfba
 CVE-2019-13350
@@ -186,9 +187,11 @@ CVE-2019-13291 (In Xpdf 4.01.01, there is a heap-based buffer over-read in the f
 	- xpdf <not-affected> (xpdf in Debian uses poppler, which is fixed)
 CVE-2019-13290 (Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_dis ...)
 	- mupdf <unfixed> (bug #931475)
+	[jessie] - mupdf <not-affected>
 	NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=701118
 	NOTE: http://git.ghostscript.com/?p=mupdf.git;h=aaf794439e40a2ef544f15b50c20e657414dec7a
 	NOTE: http://git.ghostscript.com/?p=mupdf.git;h=ed19bc806809ad10c4ddce515d375581b86ede85
+	NOTE: Introduced in 1.6 / http://git.ghostscript.com/?p=mupdf.git;a=commit;f=source/fitz/list-device.c;h=e9411aba2b71b67b8521f55917ab26585c464b88
 CVE-2019-13289 (In Xpdf 4.01.01, there is a use-after-free vulnerability in the functi ...)
 	- xpdf <not-affected> (xpdf in Debian uses poppler, which is fixed)
 CVE-2019-13288 (In Xpdf 4.01.01, the Parser::getObj() function in Parser.cc may cause  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/08c69d162bebd6cf7421a995b84fba39dc866c3d...45d49679a797a7da7125ef8d0da2f5aed561093f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/08c69d162bebd6cf7421a995b84fba39dc866c3d...45d49679a797a7da7125ef8d0da2f5aed561093f
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190706/0e1f491b/attachment.html>


More information about the debian-security-tracker-commits mailing list