The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 8 LTS:
DLA 1838-1: mupdf security update
Debian GNU/Linux 9:
DSA 4472-1: expat security update
Debian GNU/Linux 8 LTS:
DLA 1838-1: mupdf security update
Debian GNU/Linux 9:
DSA 4472-1: expat security update
DLA 1838-1: mupdf security update
Package : mupdf
Version : 1.5-1+deb8u6
CVE ID : CVE-2018-5686 CVE-2019-6130 CVE-2018-6192
Debian Bug : 887130 888487 918971
Several minor issues have been fixed in mupdf, a lightweight PDF viewer
tailored for display of high quality anti-aliased graphics.
CVE-2018-5686
In MuPDF, there was an infinite loop vulnerability and application
hang in the pdf_parse_array function (pdf/pdf-parse.c) because EOF
not having been considered. Remote attackers could leverage this
vulnerability to cause a denial of service via a crafted PDF file.
CVE-2019-6130
MuPDF had a SEGV in the function fz_load_page of the fitz/document.c
file, as demonstrated by mutool. This was related to page-number
mishandling in cbz/mucbz.c, cbz/muimg.c, and svg/svg-doc.c.
CVE-2018-6192
In MuPDF, the pdf_read_new_xref function in pdf/pdf-xref.c allowed
remote attackers to cause a denial of service (segmentation violation
and application crash) via a crafted PDF file.
For Debian 8 "Jessie", these problems have been fixed in version
1.5-1+deb8u6.
We recommend that you upgrade your mupdf packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DSA 4472-1: expat security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4472-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 28, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : expat
CVE ID : CVE-2018-20843
Debian Bug : 931031
It was discovered that Expat, an XML parsing C library, did not properly
handled XML input including XML names that contain a large number of
colons, potentially resulting in denial of service.
For the stable distribution (stretch), this problem has been fixed in
version 2.2.0-2+deb9u2.
We recommend that you upgrade your expat packages.
For the detailed security status of expat please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/expat
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/