mupdf: CVE-2020-16600

Related Vulnerabilities: CVE-2020-16600  

Debian Bug report logs - #989526
mupdf: CVE-2020-16600

version graph

Reported by: Bastian Germann <bastiangermann@fishpost.de>

Date: Sun, 6 Jun 2021 10:45:01 UTC

Severity: important

Tags: buster, patch, pending, security, upstream

Found in versions mupdf/1.14.0+ds1-4, mupdf/1.14.0+ds1-4+deb10u2

Fixed in version mupdf/1.17.0+ds1-1

Done: Salvatore Bonaccorso <carnil@debian.org>

Forwarded to https://bugs.ghostscript.com/show_bug.cgi?id=702253

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, Kan-Ru Chen (陳侃如) <koster@debian.org>:
Bug#989526; Package src:mupdf. (Sun, 06 Jun 2021 10:45:03 GMT) (full text, mbox, link).


Acknowledgement sent to Bastian Germann <bastiangermann@fishpost.de>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Kan-Ru Chen (陳侃如) <koster@debian.org>. (Sun, 06 Jun 2021 10:45:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Bastian Germann <bastiangermann@fishpost.de>
To: submit@bugs.debian.org
Subject: mupdf: CVE-2020-16600
Date: Sun, 6 Jun 2021 12:40:04 +0200
Source: mupdf
Version: 1.14.0+ds1-4+deb10u2
Severity: normal
Tags: security buster patch upstream pending
Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=702253
X-Debbugs-Cc: team@security.debian.org

Hi,

The following vulnerability was published for mupdf.
It is already addressed in bullseye and sid.

I have prepared a NMU RFS with the fix for buster at #983104.

CVE-2020-16600[0]:
| A Use After Free vulnerability exists in Artifex Software, Inc. MuPDF library 1.17.0-rc1
| and earlier when a valid page was followed by a page with invalid pixmap dimensions,
| causing bander - a static - to point to previously freed memory instead of a newband_writer.

[0] https://security-tracker.debian.org/tracker/CVE-2020-16600
[1] https://bugs.ghostscript.com/show_bug.cgi?id=702253



Severity set to 'important' from 'normal' Request was from Bastian Germann <bastiangermann@fishpost.de> to control@bugs.debian.org. (Sun, 06 Jun 2021 11:27:04 GMT) (full text, mbox, link).


Marked as found in versions mupdf/1.14.0+ds1-4. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 06 Jun 2021 11:45:05 GMT) (full text, mbox, link).


Marked as fixed in versions mupdf/1.17.0+ds1-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 06 Jun 2021 11:45:05 GMT) (full text, mbox, link).


Marked Bug as done Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 06 Jun 2021 11:45:05 GMT) (full text, mbox, link).


Notification sent to Bastian Germann <bastiangermann@fishpost.de>:
Bug acknowledged by developer. (Sun, 06 Jun 2021 11:45:06 GMT) (full text, mbox, link).


Message sent on to Bastian Germann <bastiangermann@fishpost.de>:
Bug#989526. (Sun, 06 Jun 2021 11:45:07 GMT) (full text, mbox, link).


Message #18 received at 989526-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 989526-submitter@bugs.debian.org
Subject: found 989526 in 1.14.0+ds1-4, closing 989526
Date: Sun, 06 Jun 2021 13:42:16 +0200
found 989526 1.14.0+ds1-4
close 989526 1.17.0+ds1-1
thanks




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sun Jun 6 16:14:03 2021; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.