Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2018:0227-1

Опубликовано: 25 янв. 2018
Источник: suse-cvrf

Описание

Security update for mupdf

This update for mupdf to version 1.12.0 fixes several issues.

These security issues were fixed:

  • CVE-2018-5686: Prevent infinite loop in pdf_parse_array function because EOF is not considered. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted pdf file (bsc#1075936).
  • CVE-2017-15369: The build_filter_chain function in pdf/pdf-stream.c mishandled a case where a variable may reside in a register, which allowed remote attackers to cause a denial of service (Fitz fz_drop_imp use-after-free and application crash) or possibly have unspecified other impact via a crafted PDF document (bsc#1063413).
  • CVE-2017-15587: Prevent integer overflow in pdf_read_new_xref_section that allowed for DoS (bsc#1064027).
  • CVE-2017-17866: Fixed mishandling of length changes when a repair operation occured during a clean operation, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted PDF document (bsc#1074116).
  • CVE-2017-17858: Fixed a heap-based buffer overflow in the ensure_solid_xref function which allowed a remote attacker to potentially execute arbitrary code via a crafted PDF file, because xref subsection object numbers were unrestricted (bsc#1077161).

For non-security changes please refer to the changelog.

Список пакетов

openSUSE Leap 42.2
mupdf-1.12.0-23.1
mupdf-devel-static-1.12.0-23.1
openSUSE Leap 42.3
mupdf-1.12.0-23.1
mupdf-devel-static-1.12.0-23.1

Описание

The build_filter_chain function in pdf/pdf-stream.c in Artifex MuPDF before 2017-09-25 mishandles a certain case where a variable may reside in a register, which allows remote attackers to cause a denial of service (Fitz fz_drop_imp use-after-free and application crash) or possibly have unspecified other impact via a crafted PDF document.


Затронутые продукты
openSUSE Leap 42.2:mupdf-1.12.0-23.1
openSUSE Leap 42.2:mupdf-devel-static-1.12.0-23.1
openSUSE Leap 42.3:mupdf-1.12.0-23.1
openSUSE Leap 42.3:mupdf-devel-static-1.12.0-23.1

Ссылки

Описание

An integer overflow was discovered in pdf_read_new_xref_section in pdf/pdf-xref.c in Artifex MuPDF 1.11.


Затронутые продукты
openSUSE Leap 42.2:mupdf-1.12.0-23.1
openSUSE Leap 42.2:mupdf-devel-static-1.12.0-23.1
openSUSE Leap 42.3:mupdf-1.12.0-23.1
openSUSE Leap 42.3:mupdf-devel-static-1.12.0-23.1

Ссылки

Описание

Heap-based buffer overflow in the ensure_solid_xref function in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 allows a remote attacker to potentially execute arbitrary code via a crafted PDF file, because xref subsection object numbers are unrestricted.


Затронутые продукты
openSUSE Leap 42.2:mupdf-1.12.0-23.1
openSUSE Leap 42.2:mupdf-devel-static-1.12.0-23.1
openSUSE Leap 42.3:mupdf-1.12.0-23.1
openSUSE Leap 42.3:mupdf-devel-static-1.12.0-23.1

Ссылки

Описание

pdf/pdf-write.c in Artifex MuPDF before 1.12.0 mishandles certain length changes when a repair operation occurs during a clean operation, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted PDF document.


Затронутые продукты
openSUSE Leap 42.2:mupdf-1.12.0-23.1
openSUSE Leap 42.2:mupdf-devel-static-1.12.0-23.1
openSUSE Leap 42.3:mupdf-1.12.0-23.1
openSUSE Leap 42.3:mupdf-devel-static-1.12.0-23.1

Ссылки

Описание

In MuPDF 1.12.0, there is an infinite loop vulnerability and application hang in the pdf_parse_array function (pdf/pdf-parse.c) because EOF is not considered. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted pdf file.


Затронутые продукты
openSUSE Leap 42.2:mupdf-1.12.0-23.1
openSUSE Leap 42.2:mupdf-devel-static-1.12.0-23.1
openSUSE Leap 42.3:mupdf-1.12.0-23.1
openSUSE Leap 42.3:mupdf-devel-static-1.12.0-23.1

Ссылки