Debian Bug report logs -
#738857
mupdf: CVE-2014-2013: Stack-based Buffer Overflow in xps_parse_color()
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Kan-Ru Chen (陳侃如) <koster@debian.org>
:
Bug#738857
; Package mupdf
.
(Thu, 13 Feb 2014 15:03:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Moritz Muehlenhoff <jmm@inutil.org>
:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Kan-Ru Chen (陳侃如) <koster@debian.org>
.
(Thu, 13 Feb 2014 15:03:06 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: mupdf
Severity: grave
Tags: security
Justification: user security hole
Please see http://www.hdwsec.fr/blog/mupdf.html
Can you please contact upstream for a patch and whether this affects Linux builds
of mupdf?
Cheers,
Moritz
Information forwarded
to debian-bugs-dist@lists.debian.org, Kan-Ru Chen (陳侃如) <koster@debian.org>
:
Bug#738857
; Package mupdf
.
(Fri, 14 Feb 2014 01:57:08 GMT) (full text, mbox, link).
Acknowledgement sent
to mmcallis@redhat.com
:
Extra info received and forwarded to list. Copy sent to Kan-Ru Chen (陳侃如) <koster@debian.org>
.
(Fri, 14 Feb 2014 01:57:08 GMT) (full text, mbox, link).
Message #10 received at 738857@bugs.debian.org (full text, mbox, reply):
Hello,
I have not tested to see if Linux is affected but I did find the Red Hat
bug:
https://bugzilla.redhat.com/show_bug.cgi?id=1056699
It links to http://bugs.ghostscript.com/show_bug.cgi?id=694957 and
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
Cheers,
--
Murray McAllister / Red Hat Security Response Team
Information forwarded
to debian-bugs-dist@lists.debian.org, Kan-Ru Chen (陳侃如) <koster@debian.org>
:
Bug#738857
; Package mupdf
.
(Fri, 14 Feb 2014 01:57:11 GMT) (full text, mbox, link).
Acknowledgement sent
to mmcallis@redhat.com
:
Extra info received and forwarded to list. Copy sent to Kan-Ru Chen (陳侃如) <koster@debian.org>
.
(Fri, 14 Feb 2014 01:57:11 GMT) (full text, mbox, link).
Message #15 received at 738857@bugs.debian.org (full text, mbox, reply):
Hello,
A stack-based buffer overflow in MuPDF's xps_parse_color() function was
reported. Full details in http://www.hdwsec.fr/blog/mupdf.html
Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=694957
Upstream fix:
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
Red Hat bug: https://bugzilla.redhat.com/show_bug.cgi?id=1056699
Thanks,
--
Murray McAllister / Red Hat Security Response Team
Information forwarded
to debian-bugs-dist@lists.debian.org, Kan-Ru Chen (陳侃如) <koster@debian.org>
:
Bug#738857
; Package mupdf
.
(Tue, 18 Feb 2014 12:30:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to Kan-Ru Chen (陳侃如) <koster@debian.org>
.
(Tue, 18 Feb 2014 12:30:04 GMT) (full text, mbox, link).
Message #22 received at 738857@bugs.debian.org (full text, mbox, reply):
Control: retitle -1 mupdf: CVE-2014-2013: Stack-based Buffer Overflow in xps_parse_color()
Hi,
CVE-2014-2013 was assigned for this issue.
Regards,
Salvatore
Changed Bug title to 'mupdf: CVE-2014-2013: Stack-based Buffer Overflow in xps_parse_color()' from 'mupdf: Stack-based Buffer Overflow in xps_parse_color()'
Request was from Salvatore Bonaccorso <carnil@debian.org>
to 738857-submit@bugs.debian.org
.
(Tue, 18 Feb 2014 12:30:04 GMT) (full text, mbox, link).
Added tag(s) fixed-upstream.
Request was from Axel Beckert <abe@debian.org>
to control@bugs.debian.org
.
(Fri, 28 Feb 2014 16:39:12 GMT) (full text, mbox, link).
Reply sent
to Kan-Ru Chen (陳侃如) <koster@debian.org>
:
You have taken responsibility.
(Sun, 09 Mar 2014 16:21:30 GMT) (full text, mbox, link).
Notification sent
to Moritz Muehlenhoff <jmm@inutil.org>
:
Bug acknowledged by developer.
(Sun, 09 Mar 2014 16:21:30 GMT) (full text, mbox, link).
Message #31 received at 738857-close@bugs.debian.org (full text, mbox, reply):
Source: mupdf
Source-Version: 1.3-2
We believe that the bug you reported is fixed in the latest version of
mupdf, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 738857@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Kan-Ru Chen (陳侃如) <koster@debian.org> (supplier of updated mupdf package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 09 Mar 2014 23:41:55 +0800
Source: mupdf
Binary: libmupdf-dev mupdf mupdf-tools
Architecture: source amd64
Version: 1.3-2
Distribution: unstable
Urgency: medium
Maintainer: Kan-Ru Chen (陳侃如) <koster@debian.org>
Changed-By: Kan-Ru Chen (陳侃如) <koster@debian.org>
Description:
libmupdf-dev - development files for the MuPDF viewer
mupdf - lightweight PDF viewer
mupdf-tools - commmand line tools for the MuPDF viewer
Closes: 699684 736125 738857
Changes:
mupdf (1.3-2) unstable; urgency=medium
.
* Fix CVE-2014-2013: Stack-based Buffer Overflow in
xps_parse_color(). (Closes: #738857)
* Add description of key P to mupdf(1). (Closes: #736125)
* Add description of BROWSER env to mupdf(1). (Closes: #699684)
* Bump Standards-Version to 3.9.5, no changes needed
Checksums-Sha1:
2e6a5bdb671b9710c7ea50fbd73605e1da9f5395 2060 mupdf_1.3-2.dsc
61514053aaa956ded4a14a8400651518a4068b32 12564 mupdf_1.3-2.debian.tar.xz
a15f86f9980ddc7242e596dab2ebf999d196a283 3079560 libmupdf-dev_1.3-2_amd64.deb
0bf60c3a19724a057f857180332a04f8a7312296 2981902 mupdf_1.3-2_amd64.deb
797a4a2b78ec4f2c1fff6f5fb75ec0f88fbae07d 3057354 mupdf-tools_1.3-2_amd64.deb
Checksums-Sha256:
15c9e74124f3656fc9ae6719e757e1aebb23faa6f8d8c3824cbbc7d62d3ec0a0 2060 mupdf_1.3-2.dsc
16011705809482db22bd53508e4f537842a4daac33d674ff478bfe9a1495fdab 12564 mupdf_1.3-2.debian.tar.xz
616926bc9a457d19e0f0c2a8b3db30626e0ef8f5f60f5ca2efafc7a6471f7d42 3079560 libmupdf-dev_1.3-2_amd64.deb
24a8e04f199dd685fb91ded268437269397c965b8e9a15f84b7eee9b0a8e27ca 2981902 mupdf_1.3-2_amd64.deb
3aea6a59764fb3f805dfe14f16c88168cc1f6beef5553ea9e41fca6d192e2282 3057354 mupdf-tools_1.3-2_amd64.deb
Files:
09c7f53244085ea098a72536adca3e9c 2060 text optional mupdf_1.3-2.dsc
81bfbb71fe903f4f38ca2d3499e5648e 12564 text optional mupdf_1.3-2.debian.tar.xz
41c3119ee5cfe64084586b8777be2555 3079560 libdevel optional libmupdf-dev_1.3-2_amd64.deb
389aa9b3fbfa63ff0288dfffb11315f0 2981902 text optional mupdf_1.3-2_amd64.deb
11842b1a61e31127814823289b2ca00b 3057354 text optional mupdf-tools_1.3-2_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=7n3i
-----END PGP SIGNATURE-----
Reply sent
to Kan-Ru Chen (陳侃如) <koster@debian.org>
:
You have taken responsibility.
(Sun, 15 Jun 2014 21:42:05 GMT) (full text, mbox, link).
Notification sent
to Moritz Muehlenhoff <jmm@inutil.org>
:
Bug acknowledged by developer.
(Sun, 15 Jun 2014 21:42:05 GMT) (full text, mbox, link).
Message #36 received at 738857-close@bugs.debian.org (full text, mbox, reply):
Source: mupdf
Source-Version: 0.9-2+deb7u1
We believe that the bug you reported is fixed in the latest version of
mupdf, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 738857@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Kan-Ru Chen (陳侃如) <koster@debian.org> (supplier of updated mupdf package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 03 Jun 2014 23:59:34 +0800
Source: mupdf
Binary: libmupdf-dev mupdf mupdf-tools
Architecture: source amd64
Version: 0.9-2+deb7u1
Distribution: wheezy-security
Urgency: high
Maintainer: Kan-Ru Chen <koster@debian.org>
Changed-By: Kan-Ru Chen (陳侃如) <koster@debian.org>
Description:
libmupdf-dev - development files for the MuPDF viewer
mupdf - lightweight PDF viewer
mupdf-tools - commmand line tools for the MuPDF viewer
Closes: 738857
Changes:
mupdf (0.9-2+deb7u1) wheezy-security; urgency=high
.
* Backport fix of CVE-2014-2013: Stack-based Buffer Overflow in
xps_parse_color() from unstable. (Closes: #738857)
Checksums-Sha1:
f525c41af74839c7ebe21f613ae49840fd61ce80 2028 mupdf_0.9-2+deb7u1.dsc
3a3ba42d19e3211199110e7c782263241cdea8a0 3917075 mupdf_0.9.orig.tar.gz
3618b0089aac810c798acb22a2dba91a9f92d3aa 11042 mupdf_0.9-2+deb7u1.debian.tar.gz
431f34d203760fb795c029574156f6f97fd670e2 3226332 libmupdf-dev_0.9-2+deb7u1_amd64.deb
8cee54c0d4a6f06dc6bdf325f555f48948f6d9a4 3149712 mupdf_0.9-2+deb7u1_amd64.deb
dc494ed99edcce8dc0e7734cc9e88a15c8870588 3426540 mupdf-tools_0.9-2+deb7u1_amd64.deb
Checksums-Sha256:
75f17d70355494ab265faa3c5fdb69ff2d4a046c3e8e46f3b8e63934fed523c3 2028 mupdf_0.9-2+deb7u1.dsc
abed825cb1d73e0e28f0a7ee72b5d7a451ba41d21b0c55837ed2a212f3b16b2d 3917075 mupdf_0.9.orig.tar.gz
9f620fed53ab4396ca5180fbf35ed64b09cb0c8ca5204adb5681ce91efcf6beb 11042 mupdf_0.9-2+deb7u1.debian.tar.gz
5a70acd80bc81de40d3f457eaa47a69b826da959108e01d5ad2e2bce4012cdd3 3226332 libmupdf-dev_0.9-2+deb7u1_amd64.deb
de596200a3db17f28c3a54035be16ae61805fc05b898e133dd77a2c2537d20d4 3149712 mupdf_0.9-2+deb7u1_amd64.deb
8bc12a79793bdbeb8337229aff7aecf92e7cc2ceebde4d891bfad310ce2bef02 3426540 mupdf-tools_0.9-2+deb7u1_amd64.deb
Files:
544961c6667a8e1f54b9dfd6cd13ea4d 2028 text optional mupdf_0.9-2+deb7u1.dsc
76640ee16a797a27fe49cc0eaa87ce3a 3917075 text optional mupdf_0.9.orig.tar.gz
65030eb0a067b4af07b592344422f9cb 11042 text optional mupdf_0.9-2+deb7u1.debian.tar.gz
48f4403198a98e58686bb9a06dd1d095 3226332 libdevel optional libmupdf-dev_0.9-2+deb7u1_amd64.deb
8d5e7f5ac00bb62d73f5062169105c43 3149712 text optional mupdf_0.9-2+deb7u1_amd64.deb
0aa04f429a7bd3a25570d9e49d1edf39 3426540 text optional mupdf-tools_0.9-2+deb7u1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=dE/V
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org
.
(Mon, 14 Jul 2014 07:30:48 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 13:55:19 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.