Date: Wed, 12 Oct 2016 00:49:00 +0000 (UTC) From: Mark Felder <feld@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r423813 - head/security/vuxml Message-ID: <201610120049.u9C0n0SJ007230@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: feld Date: Wed Oct 12 00:49:00 2016 New Revision: 423813 URL: https://svnweb.freebsd.org/changeset/ports/423813 Log: Document mupdf vulnerabilites PR: 212207 Security: CVE-2016-6525 Security: CVE-2016-6265 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Oct 12 00:46:35 2016 (r423812) +++ head/security/vuxml/vuln.xml Wed Oct 12 00:49:00 2016 (r423813) @@ -58,6 +58,50 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="47157c14-9013-11e6-a590-14dae9d210b8"> + <topic>mupdf -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mupdf</name> + <range><lt>1.9a_1,1</lt></range> + </package> + <package> + <name>llpp</name> + <range><lt>22_2</lt></range> + </package> + <package> + <name>zathura-pdf-mupdf</name> + <range><lt>0.3.0_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Tobias Kortkamp reports:</p> + <blockquote cite="http://openbsd-archive.7691.n7.nabble.com/mupdf-CVE-2016-6525-amp-CVE-2016-6265-td302904.html"> + <p>Heap-based buffer overflow in the pdf_load_mesh_params + function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a + denial of service (crash) or execute arbitrary code via a large decode + array.</p> + <p>Use-after-free vulnerability in the pdf_load_xref function in + pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of + service (crash) via a crafted PDF file.</p> + </blockquote> + </body> + </description> + <references> + <url>http://openbsd-archive.7691.n7.nabble.com/mupdf-CVE-2016-6525-amp-CVE-2016-6265-td302904.html</url> + <url>http://bugs.ghostscript.com/show_bug.cgi?id=696941</url> + <url>http://bugs.ghostscript.com/show_bug.cgi?id=696954</url> + <cvename>CVE-2016-6525</cvename> + <cvename>CVE-2016-6265</cvename> + <freebsdpr>212207</freebsdpr> + </references> + <dates> + <discovery>2016-08-27</discovery> + <entry>2016-10-12</entry> + </dates> + </vuln> + <vuln vid="b7d56d0b-7a11-11e6-af78-589cfc0654e1"> <topic>openjpeg -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201610120049.u9C0n0SJ007230>