Debian 10226 Published by

The following updates has been released for Debian GNU/Linux:

Debian GNU/Linux 8 LTS:
DLA 1838-1: mupdf security update

Debian GNU/Linux 9:
DSA 4472-1: expat security update



DLA 1838-1: mupdf security update

Package : mupdf
Version : 1.5-1+deb8u6
CVE ID : CVE-2018-5686 CVE-2019-6130 CVE-2018-6192
Debian Bug : 887130 888487 918971


Several minor issues have been fixed in mupdf, a lightweight PDF viewer
tailored for display of high quality anti-aliased graphics.

CVE-2018-5686

In MuPDF, there was an infinite loop vulnerability and application
hang in the pdf_parse_array function (pdf/pdf-parse.c) because EOF
not having been considered. Remote attackers could leverage this
vulnerability to cause a denial of service via a crafted PDF file.

CVE-2019-6130

MuPDF had a SEGV in the function fz_load_page of the fitz/document.c
file, as demonstrated by mutool. This was related to page-number
mishandling in cbz/mucbz.c, cbz/muimg.c, and svg/svg-doc.c.

CVE-2018-6192

In MuPDF, the pdf_read_new_xref function in pdf/pdf-xref.c allowed
remote attackers to cause a denial of service (segmentation violation
and application crash) via a crafted PDF file.

For Debian 8 "Jessie", these problems have been fixed in version
1.5-1+deb8u6.

We recommend that you upgrade your mupdf packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

DSA 4472-1: expat security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4472-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 28, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : expat
CVE ID : CVE-2018-20843
Debian Bug : 931031

It was discovered that Expat, an XML parsing C library, did not properly
handled XML input including XML names that contain a large number of
colons, potentially resulting in denial of service.

For the stable distribution (stretch), this problem has been fixed in
version 2.2.0-2+deb9u2.

We recommend that you upgrade your expat packages.

For the detailed security status of expat please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/expat

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/