[Git][security-tracker-team/security-tracker][master] 3 commits: mark CVE-2018-1000038 as not-affected for Stretch
Thorsten Alteholz
alteholz at debian.org
Tue Jul 14 14:50:26 BST 2020
Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits:
71bb370f by Thorsten Alteholz at 2020-07-14T15:20:15+02:00
mark CVE-2018-1000038 as not-affected for Stretch
- - - - -
42be60d1 by Thorsten Alteholz at 2020-07-14T15:32:04+02:00
mark CVE-2018-1000039 as not-affected for Stretch
- - - - -
160b42e1 by Thorsten Alteholz at 2020-07-14T15:48:56+02:00
mark CVE-2019-6131 as not-affected for Stretch
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -80286,7 +80286,7 @@ CVE-2019-6132 (An issue was discovered in Bento4 v1.5.1-627. There is a memory l
NOT-FOR-US: Bento4
CVE-2019-6131 (svg-run.c in Artifex MuPDF 1.14.0 has infinite recursion with stack co ...)
- mupdf 1.14.0+ds1-3 (bug #918970)
- [stretch] - mupdf <no-dsa> (Minor issue)
+ [stretch] - mupdf <not-affected> (vulnerable code not present)
[jessie] - mupdf <not-affected> (vulnerable code not present)
NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=700442
NOTE: http://www.ghostscript.com/cgi-bin/findgit.cgi?c8f7e48ff74720a5e984ae19d978a5ab4d5dde5b
@@ -132508,6 +132508,7 @@ CVE-2018-1000040 (In MuPDF 1.12.0 and earlier, multiple use of uninitialized val
NOTE: http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=83d4dae44c71816c084a635550acc1a51529b881;hp=f597300439e62f5e921f0d7b1e880b5c1a1f1607
CVE-2018-1000039 (In MuPDF 1.12.0 and earlier, multiple heap use after free bugs in the ...)
- mupdf 1.13.0+ds1-1
+ [stretch] - mupdf <not-affected> (vulnerable code not present)
[jessie] - mupdf <not-affected> (vulnerable code not present)
[wheezy] - mupdf <not-affected> (vulnerable code not present)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5492
@@ -132519,6 +132520,7 @@ CVE-2018-1000039 (In MuPDF 1.12.0 and earlier, multiple heap use after free bugs
NOTE: http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=f597300439e62f5e921f0d7b1e880b5c1a1f1607;hp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
CVE-2018-1000038 (In MuPDF 1.12.0 and earlier, a stack buffer overflow in function pdf_l ...)
- mupdf 1.13.0+ds1-1
+ [stretch] - mupdf <not-affected> (vulnerable code not present)
[jessie] - mupdf <not-affected> (vulnerable code not present)
[wheezy] - mupdf <not-affected> (vulnerable code not present)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5494
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/06739ba25a19083042f7a0cc86ca585295014a55...160b42e1309e0604b91008e96ba7b01b99c8d74a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/06739ba25a19083042f7a0cc86ca585295014a55...160b42e1309e0604b91008e96ba7b01b99c8d74a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200714/e12ee811/attachment.html>
More information about the debian-security-tracker-commits
mailing list