Summary: | <app-text/mupdf-1.10: heap overflow in pdf_load_mesh_params() (CVE-2016-6525) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | xmw |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1363694 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 606882 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2016-08-04 15:32:06 UTC
CVE-2016-6525 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6525): Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a large decode array. Fixed in 1.10 upstream. Stabilization happens in bug 589826. commit 2af6b2174d988ef90e8178a6c13839d33af70f35 Author: Michael Weber <xmw@gentoo.org> Date: Sun Feb 5 18:24:55 2017 +0100 app-text/mupdf: Remove old versions (bug 600674, 590480, 589826). Package-Manager: Portage-2.3.3, Repoman-2.3.1 GLSA request filed This issue was resolved and addressed in GLSA 201702-12 at https://security.gentoo.org/glsa/201702-12 by GLSA coordinator Thomas Deutschmann (whissi). |