CVE-2017-15587 (https://nvd.nist.gov/vuln/detail/CVE-2017-15587): An integer overflow was discovered in pdf_read_new_xref_section in pdf/pdf-xref.c in Artifex MuPDF 1.11. References: http://git.ghostscript.com/?p=mupdf.git;h=82df2631d7d0446b206ea6b434ea609b6c28b0e8 https://bugs.ghostscript.com/show_bug.cgi?id=698605 https://nandynarwhals.org/CVE-2017-15587/
@arches, please stabilize.
Really CC'ing arches this time...
x86 stable
ia64 stable
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=bcf75b3917cca220a320e7e8917c0fc8eea9428f commit bcf75b3917cca220a320e7e8917c0fc8eea9428f Author: Aaron Bauman <bman@gentoo.org> AuthorDate: 2018-04-14 14:45:38 +0000 Commit: Aaron Bauman <bman@gentoo.org> CommitDate: 2018-04-14 14:54:14 +0000 app-text/mupdf: amd64 stable Bug: https://bugs.gentoo.org/634678 Package-Manager: Portage-2.3.28, Repoman-2.3.9 app-text/mupdf/mupdf-1.12.0-r2.ebuild | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)}
arm stable
Sparc is blocked by bug 631970.
Stable on alpha.
An automated check of this bug failed - the following atom is unknown: app-text/mupdf-1.12.0-r2 Please verify the atom list.
stablized app-text/mupdf-1.13.0 on ppc/ppc64 since the listed version is no longer in tree.
Added to GLSA.
This issue was resolved and addressed in GLSA 201811-15 at https://security.gentoo.org/glsa/201811-15 by GLSA coordinator Aaron Bauman (b-man).