Control: tags -1 + fixed-upstream On Wed, May 24, 2017 at 08:40:44PM +0200, Salvatore Bonaccorso wrote: > Source: jbig2dec > Version: 0.13-1 > Severity: important > Tags: upstream security > Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=697934 > > Hi, > > the following vulnerability was published for jbig2dec. > > CVE-2017-9216[0]: > | libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and > | Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get > | function in jbig2_huffman.c. For example, the jbig2dec utility will > | crash (segmentation fault) when parsing an invalid file. > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2017-9216 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9216 > [1] https://bugs.ghostscript.com/show_bug.cgi?id=697934
Fixed upstream with http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3ebffb1d96ba0cacec23016eccb4047dab365853 Regards, Salvatore