CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
66.2%
Debian LTS Advisory DLA-2589-1 [email protected]
https://www.debian.org/lts/security/ Utkarsh Gupta
March 12, 2021 https://wiki.debian.org/LTS
Package : mupdf
Version : 1.9a+ds1-4+deb9u6
CVE ID : CVE-2020-26519 CVE-2021-3407
Debian Bug : 971595 983684
CVE-2020-26519
A heap-based buffer overflow flaw was discovered in MuPDF,
a lightweight PDF viewer, which may result in denial of
service or the execution of arbitrary code if malformed
documents are opened.
CVE-2021-3407
A double free of object during linearization was discovered
in MuPDF, a lightweight PDF viewer, which may lead to memory
corruption and other potential consequences.
For Debian 9 stretch, these problems have been fixed in version
1.9a+ds1-4+deb9u6.
We recommend that you upgrade your mupdf packages.
For the detailed security status of mupdf please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mupdf
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | amd64 | libmupdf-dev | < 1.14.0+ds1-4+deb10u3 | libmupdf-dev_1.14.0+ds1-4+deb10u3_amd64.deb |
Debian | 10 | i386 | mupdf | < 1.14.0+ds1-4+deb10u3 | mupdf_1.14.0+ds1-4+deb10u3_i386.deb |
Debian | 10 | armhf | mupdf-dbgsym | < 1.14.0+ds1-4+deb10u3 | mupdf-dbgsym_1.14.0+ds1-4+deb10u3_armhf.deb |
Debian | 10 | all | mupdf | < 1.14.0+ds1-4+deb10u3 | mupdf_1.14.0+ds1-4+deb10u3_all.deb |
Debian | 10 | amd64 | mupdf-dbgsym | < 1.14.0+ds1-4+deb10u3 | mupdf-dbgsym_1.14.0+ds1-4+deb10u3_amd64.deb |
Debian | 10 | mips | mupdf-tools-dbgsym | < 1.14.0+ds1-4+deb10u3 | mupdf-tools-dbgsym_1.14.0+ds1-4+deb10u3_mips.deb |
Debian | 10 | armhf | mupdf-tools | < 1.14.0+ds1-4+deb10u3 | mupdf-tools_1.14.0+ds1-4+deb10u3_armhf.deb |
Debian | 9 | amd64 | libmupdf-dev | < 1.9a+ds1-4+deb9u6 | libmupdf-dev_1.9a+ds1-4+deb9u6_amd64.deb |
Debian | 9 | armel | mupdf | < 1.9a+ds1-4+deb9u6 | mupdf_1.9a+ds1-4+deb9u6_armel.deb |
Debian | 9 | amd64 | mupdf-tools | < 1.9a+ds1-4+deb9u6 | mupdf-tools_1.9a+ds1-4+deb9u6_amd64.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
66.2%