Bug 1056699 (CVE-2014-2013)

Summary: CVE-2014-2013 mupdf: stack-based buffer overflow in xps_parse_color()
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jrusnack, pzhukov
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-02-06 20:28:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1056704    
Bug Blocks:    

Description Martin Prpič 2014-01-22 18:08:04 UTC
A stack-based buffer overflow was found [1] in mupdf's xps_parse_color() function. An attacker could create a specially crafted XPS file that, when opened, could cause mupdf or an application using mupdf to crash.

Upstream bug filed at [2], along with an attached reproducer. Bug is fixed upstream via [3].

[1] http://seclists.org/fulldisclosure/2014/Jan/130
[2] http://bugs.ghostscript.com/show_bug.cgi?id=694957
[3] http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc

Comment 1 Martin Prpič 2014-01-22 18:17:20 UTC
Created mupdf tracking bugs for this issue:

Affects: fedora-all [bug 1056704]

Comment 2 Fedora Update System 2014-02-06 03:44:30 UTC
mupdf-1.1-5.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 3 Fedora Update System 2014-02-06 03:54:51 UTC
mupdf-1.1-5.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.