Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#38715 - [mupdf] security patch (no CVE)
Attached to Project:
Community Packages
Opened by RbN (RbN) - Wednesday, 29 January 2014, 16:16 GMT
Last edited by Bartłomiej Piotrowski (Barthalion) - Thursday, 30 January 2014, 18:29 GMT
Opened by RbN (RbN) - Wednesday, 29 January 2014, 16:16 GMT
Last edited by Bartłomiej Piotrowski (Barthalion) - Thursday, 30 January 2014, 18:29 GMT
|
DetailsDescription (from redhat bugzilla [0]):
"A stack-based buffer overflow was found [1] in mupdf's xps_parse_color() function. An attacker could create a specially crafted XPS file that, when opened, could cause mupdf or an application using mupdf to crash." Upstream bug report [1] Resolution: patch [2] Ressources: [0] https://bugzilla.redhat.com/show_bug.cgi?id=1056699 [1] http://bugs.ghostscript.com/show_bug.cgi?id=694957 [2] http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc |
This task depends upon
Closed by Bartłomiej Piotrowski (Barthalion)
Thursday, 30 January 2014, 18:29 GMT
Reason for closing: Fixed
Thursday, 30 January 2014, 18:29 GMT
Reason for closing: Fixed
Comment by Bartłomiej Piotrowski (Barthalion) -
Thursday, 30 January 2014, 18:19 GMT
Sigh, wrong bug, re-opening again.