Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-55780

Опубликовано: 23 сент. 2025
Источник: debian
EPSS Низкий

Описание

A null pointer dereference occurs in the function break_word_for_overflow_wrap() in MuPDF 1.26.4 when rendering a malformed EPUB document. Specifically, the function calls fz_html_split_flow() to split a FLOW_WORD node, but does not check if node->next is valid before accessing node->next->overflow_wrap, resulting in a crash if the split fails or returns a partial node chain.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mupdffixed1.27.0+ds1-1experimentalpackage
mupdffixed1.27.0+ds1-2package
mupdfno-dsatrixiepackage
mupdfno-dsabookwormpackage
mupdfpostponedbullseyepackage

Примечания

  • https://bugs.ghostscript.com/show_bug.cgi?id=708720

  • Fixed by: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=bdd5d241748807378a78a622388e0312332513c5 (1.27.0-rc1)

EPSS

Процентиль: 21%
0.00068
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
5 месяцев назад

A null pointer dereference occurs in the function break_word_for_overflow_wrap() in MuPDF 1.26.4 when rendering a malformed EPUB document. Specifically, the function calls fz_html_split_flow() to split a FLOW_WORD node, but does not check if node->next is valid before accessing node->next->overflow_wrap, resulting in a crash if the split fails or returns a partial node chain.

CVSS3: 7.5
nvd
5 месяцев назад

A null pointer dereference occurs in the function break_word_for_overflow_wrap() in MuPDF 1.26.4 when rendering a malformed EPUB document. Specifically, the function calls fz_html_split_flow() to split a FLOW_WORD node, but does not check if node->next is valid before accessing node->next->overflow_wrap, resulting in a crash if the split fails or returns a partial node chain.

CVSS3: 7.5
github
5 месяцев назад

A null pointer dereference occurs in the function break_word_for_overflow_wrap() in MuPDF 1.26.4 when rendering a malformed EPUB document. Specifically, the function calls fz_html_split_flow() to split a FLOW_WORD node, but does not check if node->next is valid before accessing node->next->overflow_wrap, resulting in a crash if the split fails or returns a partial node chain.

EPSS

Процентиль: 21%
0.00068
Низкий