Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 886009 (CVE-2016-8728, CVE-2016-8729)

Summary: app-text/mupdf: multiple vulnerabilities
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: CONFIRMED ---    
Severity: normal CC: proxy-maint, rndxelement
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B2 [upstream]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-12-15 04:29:31 UTC
CVE-2016-8728 (https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0242):

An exploitable heap out of bounds write vulnerability exists in the Fitz graphical library part of the MuPDF renderer. A specially crafted PDF file can cause a out of bounds write resulting in heap metadata and sensitive process memory corruption leading to potential code execution. Victim needs to open the specially crafted file in a vulnerable reader in order to trigger this vulnerability.

CVE-2016-8729 (https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0243):

An exploitable memory corruption vulnerability exists in the JBIG2 parser of Artifex MuPDF 1.9. A specially crafted PDF can cause a negative number to be passed to a memset resulting in memory corruption and potential code execution. An attacker can specially craft a PDF and send to the victim to trigger this vulnerability.

These are old, but filing just in case. No links to any fix in the
reports. Asked in #mupdf on libera.chat about them.
Comment 1 Hans de Graaff gentoo-dev Security 2023-10-21 06:07:46 UTC
CVE-2016-8729 does not apply to us because we don't use the bundled version and looking at upstream git they also stopped using it.

CVE-2016-8728 appears not to be fixed yet.