CVE-2018-6192 (https://nvd.nist.gov/vuln/detail/CVE-2018-6192): In Artifex MuPDF 1.12.0, the pdf_read_new_xref function in pdf/pdf-xref.c allows remote attackers to cause a denial of service (segmentation violation and application crash) via a crafted pdf file. CVE-2018-6187 (https://nvd.nist.gov/vuln/detail/CVE-2018-6187): In Artifex MuPDF 1.12.0, there is a heap-based buffer overflow vulnerability in the do_pdf_save_document function in the pdf/pdf-write.c file. Remote attackers could leverage the vulnerability to cause a denial of service via a crafted pdf file. CVE-2018-5686 (https://nvd.nist.gov/vuln/detail/CVE-2018-5686): In MuPDF 1.12.0, there is an infinite loop vulnerability and application hang in the pdf_parse_array function (pdf/pdf-parse.c) because EOF is not considered. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted pdf file. CVE-2017-17858 (https://nvd.nist.gov/vuln/detail/CVE-2017-17858): Heap-based buffer overflow in the ensure_solid_xref function in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 allows a remote attacker to potentially execute arbitrary code via a crafted PDF file, because xref subsection object numbers are unrestricted.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=856a6ad1fd3dfe1ab67a2976edc3f5dedd694fa3 commit 856a6ad1fd3dfe1ab67a2976edc3f5dedd694fa3 Author: Jouni Kosonen <jouni.kosonen@tukesoft.com> AuthorDate: 2018-06-27 07:03:42 +0000 Commit: Virgil Dupras <vdupras@gentoo.org> CommitDate: 2018-07-25 01:31:14 +0000 app-text/mupdf: version bump to 1.13.0 Bug: https://bugs.gentoo.org/646010 Bug: https://bugs.gentoo.org/651828 Bug: https://bugs.gentoo.org/658618 app-text/mupdf/Manifest | 1 + .../mupdf/files/mupdf-1.13-openssl-curl-x11.patch | 39 +++++ app-text/mupdf/mupdf-1.13.0.ebuild | 166 +++++++++++++++++++++ 3 files changed, 206 insertions(+)
Syncing whiteboard status with bug 658618
added to GLSA.
This issue was resolved and addressed in GLSA 201811-15 at https://security.gentoo.org/glsa/201811-15 by GLSA coordinator Aaron Bauman (b-man).