Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 886009 (CVE-2016-8728, CVE-2016-8729) - app-text/mupdf: multiple vulnerabilities
Summary: app-text/mupdf: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2016-8728, CVE-2016-8729
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-12-15 04:29 UTC by John Helmert III
Modified: 2023-10-21 06:07 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-12-15 04:29:31 UTC
CVE-2016-8728 (https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0242):

An exploitable heap out of bounds write vulnerability exists in the Fitz graphical library part of the MuPDF renderer. A specially crafted PDF file can cause a out of bounds write resulting in heap metadata and sensitive process memory corruption leading to potential code execution. Victim needs to open the specially crafted file in a vulnerable reader in order to trigger this vulnerability.

CVE-2016-8729 (https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0243):

An exploitable memory corruption vulnerability exists in the JBIG2 parser of Artifex MuPDF 1.9. A specially crafted PDF can cause a negative number to be passed to a memset resulting in memory corruption and potential code execution. An attacker can specially craft a PDF and send to the victim to trigger this vulnerability.

These are old, but filing just in case. No links to any fix in the
reports. Asked in #mupdf on libera.chat about them.
Comment 1 Hans de Graaff gentoo-dev Security 2023-10-21 06:07:46 UTC
CVE-2016-8729 does not apply to us because we don't use the bundled version and looking at upstream git they also stopped using it.

CVE-2016-8728 appears not to be fixed yet.