Zwei Probleme in MuPDF
ID: | DSA-3655-1 |
Distribution: | Debian |
Plattformen: | Debian jessie |
Datum: | Sa, 27. August 2016, 10:25 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6265
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6525 |
Applikationen: | MuPDF |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3655-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 26, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : mupdf CVE ID : CVE-2016-6265 CVE-2016-6525 Debian Bug : 832031 833417 Two vulnerabilities were discovered in MuPDF, a lightweight PDF viewer. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-6265 Marco Grassi discovered a use-after-free vulnerability in MuPDF. An attacker can take advantage of this flaw to cause an application crash (denial-of-service), or potentially to execute arbitrary code with the privileges of the user running MuPDF, if a specially crafted PDF file is processed. CVE-2016-6525 Yu Hong and Zheng Jihong discovered a heap overflow vulnerability within the pdf_load_mesh_params function, allowing an attacker to cause an application crash (denial-of-service), or potentially to execute arbitrary code with the privileges of the user running MuPDF, if a specially crafted PDF file is processed. For the stable distribution (jessie), these problems have been fixed in version 1.5-1+deb8u1. We recommend that you upgrade your mupdf packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXwKTVAAoJEAVMuPMTQ89E4dMP/R4IElp3S0LNj7s6pY8spIro 2dLuI70yFM1ZgP+9umrYQ1m/YURlJilZ8KKF2ctAX4nYKUHiHnmc3HSa2QUB9GB/ 8QvVYxCqz918XHElV9ox7/UZP++MoErFmwHlrhWe0IBP1uohacbj/Fs0OgXO8PEA rK8jAColSQbpVfHU9QqsiqzyXXanztIJpGMxuaNAdSzdZWQhwZ3cG38yJ3uQ2bsF P3HZafgAkiPcKSo/kNF9P+CfRS0u9KvwtyN7leT38k4WwGLRanYRen2v2Oco+3T0 brLPlASnylqT3zkppk7gnGsqu8wvy1pEkhPCLAsc65FAccUhNF7QLGv+rpUoTCcE O9oB22CMHMloLGbltLpNzlYdHJPkz/SSgHBpWysvuXQ1KrF57Lx+c1lgzTV7a0T2 UwjOHchbbCl80xKfOdBN0drlKxx66sFK5PiFy7OYa0x2Ww7CNO4RY66vtPmS9Nvm RQNaOoLXgVUESE/pmeTYJjQpwXCgM0ghORHNw9biB7wbcwB4qC0Xyc9C+YLSCXQ3 3jSU0Bzip1NN+iI2RLtWP2s1feWEbM9YDjj346bV3eGXRw6SI895evTvSJqirFcP 7yhRNmRsikmsM5MJFzvhA/YielEIf+YXUCJ7uzikxbZ00ABEjuUN6cwpvsMWZJta /clmSL1QGp3mPnLpr2d5 =TD/r -----END PGP SIGNATURE----- |