From 9d0f3301e839da42e1f866a1c379b97d7d8e81f4 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Sun, 15 Nov 2020 22:34:06 +0100 Subject: Track fixed version for CVE-2016-10247/mupdf --- data/CVE/2016.list | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'data/CVE/2016.list') diff --git a/data/CVE/2016.list b/data/CVE/2016.list index 1d9a8389b3..3237d796d9 100644 --- a/data/CVE/2016.list +++ b/data/CVE/2016.list @@ -2079,7 +2079,7 @@ CVE-2016-10248 (The jpc_tsfb_synthesize function in jpc_tsfb.c in JasPer before NOTE: Not suitable for code injection, hardly denial of service NOTE: https://github.com/mdadams/jasper/commit/2e82fa00466ae525339754bb3ab0a0474a31d4bd CVE-2016-10247 (Buffer overflow in the my_getline function in jstest_main.c in Mujstes ...) - - mupdf (unimportant) + - mupdf 1.11+ds1-1 (unimportant) [wheezy] - mupdf (Vulnerable code not present) NOTE: Although jstest_main.c compiled during build and mujstest is created NOTE: it is not included in the produced binary packages -- cgit v1.2.3