aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T11:35:14Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8583[3.5] mupdf: Multiple vulnerabilities (CVE-2018-6187, CVE-2018-6192, CVE-2018...2019-07-23T11:35:14ZAlicha CH[3.5] mupdf: Multiple vulnerabilities (CVE-2018-6187, CVE-2018-6192, CVE-2018-6544, CVE-2018-1000051)CVE-2018-6187: heap-based buffer overflow in pdf/pdf-write.c:do\_pdf\_save\_document()
--------------------------------------------------------------------------------------
In Artifex MuPDF 1.12.0, there is a heap-based buffer overflow...CVE-2018-6187: heap-based buffer overflow in pdf/pdf-write.c:do\_pdf\_save\_document()
--------------------------------------------------------------------------------------
In Artifex MuPDF 1.12.0, there is a heap-based buffer overflow
vulnerability in the do\_pdf\_save\_document function in the
pdf/pdf-write.c file. Remote attackers could leverage the vulnerability
to cause a denial of service via a crafted pdf file.
### References:
https://nvd.nist.gov/vuln/detail/CVE-2018-6187
https://bugs.ghostscript.com/show\_bug.cgi?id=698908
CVE-2018-6192: Segment violation in pdf\_read\_new\_xref function in pdf/pdf-xref.c
-----------------------------------------------------------------------------------
In Artifex MuPDF 1.12.0, the pdf\_read\_new\_xref function in
pdf/pdf-xref.c allows remote attackers to cause
a denial of service (segmentation violation and application crash) via a
crafted pdf file.
### References:
https://nvd.nist.gov/vuln/detail/CVE-2018-6192
https://bugs.ghostscript.com/show\_bug.cgi?id=698916
CVE-2018-6544: denial of service (DoS) via a crafted PDF document
-----------------------------------------------------------------
pdf\_load\_obj\_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could
reference the object stream recursively and therefore
run out of error stack, which allows remote attackers to cause a denial
of service via a crafted PDF document.
### References:
https://nvd.nist.gov/vuln/detail/CVE-2018-6544
### Patches:
http://git.ghostscript.com/?p=mupdf.git;h=26527eef77b3e51c2258c8e40845bfbc015e405d
http://git.ghostscript.com/?p=mupdf.git;h=b03def134988da8c800adac1a38a41a1f09a1d89
CVE-2018-1000051: use-after-free in fz\_keep\_key\_storable function
--------------------------------------------------------------------
A flaw was found in Artifex Mupdf version 1.12.0 in
fz\_keep\_key\_storable function. There is Use After Free vulnerability
which
can be triggered by supplying a malformed PDF file. This can result in a
Denial of Service or a Possible code execution.
### References:
https://bugs.ghostscript.com/show\_bug.cgi?id=698825
https://bugs.ghostscript.com/show\_bug.cgi?id=698873
https://nvd.nist.gov/vuln/detail/CVE-2018-1000051
### Patch:
http://git.ghostscript.com/?p=mupdf.git;h=321ba1de287016b0036bf4a56ce774ad11763384
*(from redmine: issue id 8583, created on 2018-02-27, closed on 2019-05-04)*
* Relations:
* parent #85793.5.4Daniel SabogalDaniel Sabogalhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6897[3.5] mupdf: stack-based buffer overflow in main (jstest_main.c)(CVE-2017-6060)2019-07-23T11:58:45ZAlicha CH[3.5] mupdf: stack-based buffer overflow in main (jstest_main.c)(CVE-2017-6060)### Affected version:
1.10a
### Reference:
http://openwall.com/lists/oss-security/2017/02/18/1
*(from redmine: issue id 6897, created on 2017-02-20, closed on 2019-05-04)*
* Relations:
* parent #6895
* Changesets:
* Revision 48...### Affected version:
1.10a
### Reference:
http://openwall.com/lists/oss-security/2017/02/18/1
*(from redmine: issue id 6897, created on 2017-02-20, closed on 2019-05-04)*
* Relations:
* parent #6895
* Changesets:
* Revision 48776dcc01e07b1ebbf5f2ce5d2100f01db0b8bf by Daniel Sabogal on 2017-05-10T09:30:32Z:
```
main/mupdf: security fixes #6897 (CVE-2017-6060)
```3.5.4Daniel SabogalDaniel Sabogal