diff options
author | feld <feld@FreeBSD.org> | 2016-10-12 08:49:00 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2016-10-12 08:49:00 +0800 |
commit | 071be4a5f2deb3372ef1122d98f5bf1764754b1b (patch) | |
tree | ae9c214a567a189a692a00c1406a00480f5f17f6 /security | |
parent | 8b6aa552e6930873d3cc5991c432d8baa0d5be1a (diff) | |
download | freebsd-ports-graphics-071be4a5f2deb3372ef1122d98f5bf1764754b1b.tar.gz freebsd-ports-graphics-071be4a5f2deb3372ef1122d98f5bf1764754b1b.tar.zst freebsd-ports-graphics-071be4a5f2deb3372ef1122d98f5bf1764754b1b.zip |
Document mupdf vulnerabilites
PR: 212207
Security: CVE-2016-6525
Security: CVE-2016-6265
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b15e0fc52dd..8bcb6aae9cd 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,50 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="47157c14-9013-11e6-a590-14dae9d210b8"> + <topic>mupdf -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mupdf</name> + <range><lt>1.9a_1,1</lt></range> + </package> + <package> + <name>llpp</name> + <range><lt>22_2</lt></range> + </package> + <package> + <name>zathura-pdf-mupdf</name> + <range><lt>0.3.0_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Tobias Kortkamp reports:</p> + <blockquote cite="http://openbsd-archive.7691.n7.nabble.com/mupdf-CVE-2016-6525-amp-CVE-2016-6265-td302904.html"> + <p>Heap-based buffer overflow in the pdf_load_mesh_params + function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a + denial of service (crash) or execute arbitrary code via a large decode + array.</p> + <p>Use-after-free vulnerability in the pdf_load_xref function in + pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of + service (crash) via a crafted PDF file.</p> + </blockquote> + </body> + </description> + <references> + <url>http://openbsd-archive.7691.n7.nabble.com/mupdf-CVE-2016-6525-amp-CVE-2016-6265-td302904.html</url> + <url>http://bugs.ghostscript.com/show_bug.cgi?id=696941</url> + <url>http://bugs.ghostscript.com/show_bug.cgi?id=696954</url> + <cvename>CVE-2016-6525</cvename> + <cvename>CVE-2016-6265</cvename> + <freebsdpr>212207</freebsdpr> + </references> + <dates> + <discovery>2016-08-27</discovery> + <entry>2016-10-12</entry> + </dates> + </vuln> + <vuln vid="b7d56d0b-7a11-11e6-af78-589cfc0654e1"> <topic>openjpeg -- multiple vulnerabilities</topic> <affects> |