Hi, On Sun, Oct 16, 2016 at 02:51:06PM +0200, Salvatore Bonaccorso wrote: > Source: mupdf > Version: 1.5-1 > Severity: grave > Tags: security upstream patch > > Hi, > > the following vulnerability was published for mupdf. > > CVE-2016-8674[0]: > heap-use-after-free > > The issue is reproducible with src:mupdf compiled with ASAN, and two > reproducers are available on the two referenced bugs below. > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2016-8674 > [1] https://marc.info/?l=oss-security&m=147658659118554&w=2 > [2] > https://blogs.gentoo.org/ago/2016/09/22/mupdf-use-after-free-in-pdf_to_num-pdf-object-c/ > [3] http://bugs.ghostscript.com/show_bug.cgi?id=697015 > [4] http://bugs.ghostscript.com/show_bug.cgi?id=697019 > [5] > http://git.ghostscript.com/?p=mupdf.git;h=1e03c06456d997435019fb3526fa2d4be7dbc6ec
Any progress on this issue for unstable? Currently src:mupdf is at risk to not being included in stretch and autoremoved on 14th of november. Regards, Salvatore