Thorsten Alteholz pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
71bb370f by Thorsten Alteholz at 2020-07-14T15:20:15+02:00
mark CVE-2018-1000038 as not-affected for Stretch
- - - - -
42be60d1 by Thorsten Alteholz at 2020-07-14T15:32:04+02:00
mark CVE-2018-1000039 as not-affected for Stretch
- - - - -
160b42e1 by Thorsten Alteholz at 2020-07-14T15:48:56+02:00
mark CVE-2019-6131 as not-affected for Stretch
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -80286,7 +80286,7 @@ CVE-2019-6132 (An issue was discovered in Bento4
v1.5.1-627. There is a memory l
NOT-FOR-US: Bento4
CVE-2019-6131 (svg-run.c in Artifex MuPDF 1.14.0 has infinite recursion with
stack co ...)
- mupdf 1.14.0+ds1-3 (bug #918970)
- [stretch] - mupdf <no-dsa> (Minor issue)
+ [stretch] - mupdf <not-affected> (vulnerable code not present)
[jessie] - mupdf <not-affected> (vulnerable code not present)
NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=700442
NOTE:
http://www.ghostscript.com/cgi-bin/findgit.cgi?c8f7e48ff74720a5e984ae19d978a5ab4d5dde5b
@@ -132508,6 +132508,7 @@ CVE-2018-1000040 (In MuPDF 1.12.0 and earlier,
multiple use of uninitialized val
NOTE:
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=83d4dae44c71816c084a635550acc1a51529b881;hp=f597300439e62f5e921f0d7b1e880b5c1a1f1607
CVE-2018-1000039 (In MuPDF 1.12.0 and earlier, multiple heap use after free
bugs in the ...)
- mupdf 1.13.0+ds1-1
+ [stretch] - mupdf <not-affected> (vulnerable code not present)
[jessie] - mupdf <not-affected> (vulnerable code not present)
[wheezy] - mupdf <not-affected> (vulnerable code not present)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5492
@@ -132519,6 +132520,7 @@ CVE-2018-1000039 (In MuPDF 1.12.0 and earlier,
multiple heap use after free bugs
NOTE:
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=f597300439e62f5e921f0d7b1e880b5c1a1f1607;hp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
CVE-2018-1000038 (In MuPDF 1.12.0 and earlier, a stack buffer overflow in
function pdf_l ...)
- mupdf 1.13.0+ds1-1
+ [stretch] - mupdf <not-affected> (vulnerable code not present)
[jessie] - mupdf <not-affected> (vulnerable code not present)
[wheezy] - mupdf <not-affected> (vulnerable code not present)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5494
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/06739ba25a19083042f7a0cc86ca585295014a55...160b42e1309e0604b91008e96ba7b01b99c8d74a
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/06739ba25a19083042f7a0cc86ca585295014a55...160b42e1309e0604b91008e96ba7b01b99c8d74a
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits