Date: Sat, 09 Apr 2011 12:35:18 -0500 From: Zhihao Yuan <lichray@gmail.com> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/156299: graphics/mupdf is still marked vulnerable Message-ID: <4da098dc.9aa5e70a.0dc5.777f@mx.google.com> Resent-Message-ID: <201104091740.p39HeBs1093763@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 156299 >Category: ports >Synopsis: graphics/mupdf is still marked vulnerable >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Sat Apr 09 17:40:10 UTC 2011 >Closed-Date: >Last-Modified: >Originator: Zhihao Yuan >Release: FreeBSD 8.2-STABLE amd64 >Organization: Northern Illinois University >Environment: System: FreeBSD compaq.yuetime 8.2-STABLE FreeBSD 8.2-STABLE #0: Mon Mar 14 02:51:28 CDT 2011 root@compaq.yuetime:/usr/obj/usr/src/sys/HOUKAGO amd64 >Description: This problem has been fixed in version 0.8. The origin PR is at: https://code.google.com/p/sumatrapdf/issues/detail?id=1180&can=1 and I have tested the latest mupdf with the sample PDF. The malformed pdf is properly handled, and valgrind shows nothing harmful. >How-To-Repeat: >Fix: Remark the vulnerable to version < 8. >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4da098dc.9aa5e70a.0dc5.777f>