ALT-PU-2018-2415-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-10246
Buffer overflow in the main function in jstest_main.c in Mujstest in Artifex Software, Inc. MuPDF before 1.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=cfe8f35bca61056363368c343be36812abde0a06
- http://git.ghostscript.com/?p=mupdf.git%3Bh=cfe8f35bca61056363368c343be36812abde0a06
- [oss-security] 20170313 Re: mupdf: mujstest: global-buffer-overflow in main (jstest_main.c)
- [oss-security] 20170313 Re: mupdf: mujstest: global-buffer-overflow in main (jstest_main.c)
- https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflow-in-main-jstest_main-c/
- https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflow-in-main-jstest_main-c/
- https://bugs.ghostscript.com/show_bug.cgi?id=697020
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
Modified: 2024-11-21
CVE-2016-10247
Buffer overflow in the my_getline function in jstest_main.c in Mujstest in Artifex Software, Inc. MuPDF before 1.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=446097f97b71ce20fa8d1e45e070f2e62676003e
- http://git.ghostscript.com/?p=mupdf.git%3Bh=446097f97b71ce20fa8d1e45e070f2e62676003e
- [oss-security] 20170313 Re: mupdf: mujstest: global-buffer-overflow in my_getline (jstest_main.c)
- [oss-security] 20170313 Re: mupdf: mujstest: global-buffer-overflow in my_getline (jstest_main.c)
- 97099
- 97099
- https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflow-in-my_getline-jstest_main-c/
- https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflow-in-my_getline-jstest_main-c/
- https://bugs.ghostscript.com/show_bug.cgi?id=697021
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
Modified: 2024-11-21
CVE-2016-6265
Use-after-free vulnerability in the pdf_load_xref function in pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of service (crash) via a crafted PDF file.
- http://bugs.ghostscript.com/show_bug.cgi?id=696941
- http://bugs.ghostscript.com/show_bug.cgi?id=696941
- http://git.ghostscript.com/?p=mupdf.git%3Bh=fa1936405b6a84e5c9bb440912c23d532772f958
- http://git.ghostscript.com/?p=mupdf.git%3Bh=fa1936405b6a84e5c9bb440912c23d532772f958
- openSUSE-SU-2016:1926
- openSUSE-SU-2016:1926
- DSA-3655
- DSA-3655
- [oss-security] 20160721 Re: mupdf library use after free
- [oss-security] 20160721 Re: mupdf library use after free
- 92071
- 92071
- GLSA-201702-12
- GLSA-201702-12
Modified: 2024-11-21
CVE-2016-6525
Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a large decode array.
- http://bugs.ghostscript.com/show_bug.cgi?id=696954
- http://bugs.ghostscript.com/show_bug.cgi?id=696954
- http://git.ghostscript.com/?p=mupdf.git%3Bh=39b0f07dd960f34e7e6bf230ffc3d87c41ef0f2e
- http://git.ghostscript.com/?p=mupdf.git%3Bh=39b0f07dd960f34e7e6bf230ffc3d87c41ef0f2e
- DSA-3655
- DSA-3655
- [oss-security] 20160803 Re: CVE request:Heap overflow vulns in MuPDF
- [oss-security] 20160803 Re: CVE request:Heap overflow vulns in MuPDF
- 92266
- 92266
- GLSA-201702-12
- GLSA-201702-12
Modified: 2024-11-21
CVE-2016-8674
The pdf_to_num function in pdf-object.c in MuPDF before 1.10 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=1e03c06456d997435019fb3526fa2d4be7dbc6ec
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=1e03c06456d997435019fb3526fa2d4be7dbc6ec
- DSA-3797
- DSA-3797
- [oss-security] 20161015 Re: mupdf: use-after-free in pdf_to_num (pdf-object.c)
- [oss-security] 20161015 Re: mupdf: use-after-free in pdf_to_num (pdf-object.c)
- 93127
- 93127
- https://blogs.gentoo.org/ago/2016/09/22/mupdf-use-after-free-in-pdf_to_num-pdf-object-c/
- https://blogs.gentoo.org/ago/2016/09/22/mupdf-use-after-free-in-pdf_to_num-pdf-object-c/
- https://bugs.ghostscript.com/show_bug.cgi?id=697015
- https://bugs.ghostscript.com/show_bug.cgi?id=697015
- https://bugs.ghostscript.com/show_bug.cgi?id=697019
- https://bugs.ghostscript.com/show_bug.cgi?id=697019
- https://bugzilla.redhat.com/show_bug.cgi?id=1385685
- https://bugzilla.redhat.com/show_bug.cgi?id=1385685
Modified: 2024-11-21
CVE-2017-15369
The build_filter_chain function in pdf/pdf-stream.c in Artifex MuPDF before 2017-09-25 mishandles a certain case where a variable may reside in a register, which allows remote attackers to cause a denial of service (Fitz fz_drop_imp use-after-free and application crash) or possibly have unspecified other impact via a crafted PDF document.
Modified: 2024-11-21
CVE-2017-17866
pdf/pdf-write.c in Artifex MuPDF before 1.12.0 mishandles certain length changes when a repair operation occurs during a clean operation, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted PDF document.
Modified: 2024-11-21
CVE-2017-5896
Heap-based buffer overflow in the fz_subsample_pixmap function in fitz/pixmap.c in MuPDF 1.10a allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted image.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27
- http://git.ghostscript.com/?p=mupdf.git%3Bh=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27
- DSA-3797
- DSA-3797
- [oss-security] 20170206 mupdf: heap-based buffer overflow in fz_subsample_pixmap
- [oss-security] 20170206 mupdf: heap-based buffer overflow in fz_subsample_pixmap
- [oss-security] 20170207 Re: mupdf: heap-based buffer overflow in fz_subsample_pixmap
- [oss-security] 20170207 Re: mupdf: heap-based buffer overflow in fz_subsample_pixmap
- 96139
- 96139
- https://bugs.ghostscript.com/show_bug.cgi?id=697515
- https://bugs.ghostscript.com/show_bug.cgi?id=697515
- GLSA-201702-12
- GLSA-201702-12
Modified: 2024-11-21
CVE-2017-5991
An issue was discovered in Artifex MuPDF before 1912de5f08e90af1d9d0a9791f58ba3afdb9d465. The pdf_run_xobject function in pdf-op-run.c encounters a NULL pointer dereference during a Fitz fz_paint_pixmap_with_mask painting operation. Versions 1.11 and later are unaffected.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=1912de5f08e90af1d9d0a9791f58ba3afdb9d465
- http://git.ghostscript.com/?p=mupdf.git%3Bh=1912de5f08e90af1d9d0a9791f58ba3afdb9d465
- DSA-3797
- DSA-3797
- 96213
- 96213
- https://bugs.ghostscript.com/show_bug.cgi?id=697500
- https://bugs.ghostscript.com/show_bug.cgi?id=697500
- GLSA-201706-08
- GLSA-201706-08
- 42138
- 42138
Modified: 2024-11-21
CVE-2018-1000036
In Artifex MuPDF 1.12.0 and earlier, multiple memory leaks in the PDF parser allow an attacker to cause a denial of service (memory leak) via a crafted file.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5502
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5502
- https://bugs.ghostscript.com/show_bug.cgi?id=698887
- https://bugs.ghostscript.com/show_bug.cgi?id=698887
- https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=8aa2bd34065d2844aae778bd4cc20c74bbcd9406
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
- GLSA-201811-15
- GLSA-201811-15
Modified: 2024-11-21
CVE-2018-1000037
In Artifex MuPDF 1.12.0 and earlier, multiple reachable assertions in the PDF parser allow an attacker to cause a denial of service (assert crash) via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=8a3257b01faa899dd9b5e35c6bb3403cd709c371%3Bhp=de39f005f12a1afc6973c1f5cec362d6545f70cb
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=8a3257b01faa899dd9b5e35c6bb3403cd709c371%3Bhp=de39f005f12a1afc6973c1f5cec362d6545f70cb
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a%3Bhp=f51836b9732c38d945b87fda0770009a77ba680c
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a%3Bhp=f51836b9732c38d945b87fda0770009a77ba680c
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564
- https://bugs.ghostscript.com/show_bug.cgi?id=698882
- https://bugs.ghostscript.com/show_bug.cgi?id=698882
- https://bugs.ghostscript.com/show_bug.cgi?id=698886
- https://bugs.ghostscript.com/show_bug.cgi?id=698886
- https://bugs.ghostscript.com/show_bug.cgi?id=698888
- https://bugs.ghostscript.com/show_bug.cgi?id=698888
- https://bugs.ghostscript.com/show_bug.cgi?id=698890
- https://bugs.ghostscript.com/show_bug.cgi?id=698890
- GLSA-201811-15
- GLSA-201811-15
- DSA-4334
- DSA-4334
Modified: 2024-11-21
CVE-2018-1000038
In Artifex MuPDF 1.12.0 and earlier, a stack buffer overflow in function pdf_lookup_cmap_full in pdf/pdf-cmap.c could allow an attacker to execute arbitrary code via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5494
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5494
- https://bugs.ghostscript.com/show_bug.cgi?id=698884
- https://bugs.ghostscript.com/show_bug.cgi?id=698884
- GLSA-201811-15
- GLSA-201811-15
Modified: 2024-11-21
CVE-2018-1000039
In Artifex MuPDF 1.12.0 and earlier, multiple heap use after free bugs in the PDF parser could allow an attacker to execute arbitrary code, read memory, or cause a denial of service via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=4dcc6affe04368461310a21238f7e1871a752a05%3Bhp=8ec561d1bccc46e9db40a9f61310cd8b3763914e
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=4dcc6affe04368461310a21238f7e1871a752a05%3Bhp=8ec561d1bccc46e9db40a9f61310cd8b3763914e
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5492
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5492
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5513
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5513
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5521
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5521
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5604
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5604
- https://bugs.ghostscript.com/show_bug.cgi?id=698883
- https://bugs.ghostscript.com/show_bug.cgi?id=698883
- https://bugs.ghostscript.com/show_bug.cgi?id=698888
- https://bugs.ghostscript.com/show_bug.cgi?id=698888
- https://bugs.ghostscript.com/show_bug.cgi?id=698891
- https://bugs.ghostscript.com/show_bug.cgi?id=698891
- https://bugs.ghostscript.com/show_bug.cgi?id=698892
- https://bugs.ghostscript.com/show_bug.cgi?id=698892
- https://bugs.ghostscript.com/show_bug.cgi?id=698901
- https://bugs.ghostscript.com/show_bug.cgi?id=698901
- GLSA-201811-15
- GLSA-201811-15
Modified: 2024-11-21
CVE-2018-1000040
In Artifex MuPDF 1.12.0 and earlier, multiple use of uninitialized value bugs in the PDF parser could allow an attacker to cause a denial of service (crash) or influence program flow via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=83d4dae44c71816c084a635550acc1a51529b881%3Bhp=f597300439e62f5e921f0d7b1e880b5c1a1f1607
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=83d4dae44c71816c084a635550acc1a51529b881%3Bhp=f597300439e62f5e921f0d7b1e880b5c1a1f1607
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5596
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5596
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5600
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5600
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5603
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5603
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5609
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5609
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5610
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5610
- https://bugs.ghostscript.com/show_bug.cgi?id=698904
- https://bugs.ghostscript.com/show_bug.cgi?id=698904
- https://bugs.ghostscript.com/show_bug.cgi?id=699086
- https://bugs.ghostscript.com/show_bug.cgi?id=699086
- https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=ace9e69017c08e1e4ce5912014177414c0382004
- https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=ace9e69017c08e1e4ce5912014177414c0382004
- GLSA-201811-15
- GLSA-201811-15
- DSA-4334
- DSA-4334