FS#38715 - [mupdf] security patch (no CVE)
Attached to Project:
Community Packages
Opened by RbN (RbN) - Wednesday, 29 January 2014, 16:16 GMT
Last edited by Bartłomiej Piotrowski (Barthalion) - Thursday, 30 January 2014, 18:29 GMT
Opened by RbN (RbN) - Wednesday, 29 January 2014, 16:16 GMT
Last edited by Bartłomiej Piotrowski (Barthalion) - Thursday, 30 January 2014, 18:29 GMT
|
Details
Description (from redhat bugzilla [0]):
"A stack-based buffer overflow was found [1] in mupdf's xps_parse_color() function. An attacker could create a specially crafted XPS file that, when opened, could cause mupdf or an application using mupdf to crash." Upstream bug report [1] Resolution: patch [2] Ressources: [0] https://bugzilla.redhat.com/show_bug.cgi?id=1056699 [1] http://bugs.ghostscript.com/show_bug.cgi?id=694957 [2] http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc |
This task depends upon
Closed by Bartłomiej Piotrowski (Barthalion)
Thursday, 30 January 2014, 18:29 GMT
Reason for closing: Fixed
Thursday, 30 January 2014, 18:29 GMT
Reason for closing: Fixed
Comment by
Bartłomiej Piotrowski (Barthalion)
- Thursday, 30 January 2014, 18:19 GMT
Sigh, wrong bug, re-opening again.