Bugzilla – Bug 1190175
VUL-0: CVE-2020-16600: mupdf: use-after-free when a valid page was followed by a page with invalid pixmap dimensions
Last modified: 2021-10-11 19:33:34 UTC
A Use After Free vulnerability exists in Artifex Software, Inc. MuPDF library 1.17.0-rc1 and earlier when a valid page was followed by a page with invalid pixmap dimensions, causing bander - a static - to point to previously freed memory instead of a newband_writer. Reference: https://bugs.ghostscript.com/show_bug.cgi?id=702253 Upstream patch: http://git.ghostscript.com/?p=mupdf.git;h=96751b25462f83d6e16a9afaf8980b0c3f979c8b References: https://bugzilla.redhat.com/show_bug.cgi?id=1968638 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16600 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16600 http://git.ghostscript.com/?p=mupdf.git;h=96751b25462f83d6e16a9afaf8980b0c3f979c8b https://bugs.ghostscript.com/show_bug.cgi?id=702253
This is an autogenerated message for OBS integration: This bug (1190175) was mentioned in https://build.opensuse.org/request/show/920347 15.2+Backports:SLE-15-SP1+Backports:SLE-15-SP2+Backports:SLE-15-SP3 / mupdf
openSUSE-SU-2021:1341-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1190175,1190176 CVE References: CVE-2020-16600,CVE-2020-19609 JIRA References: Sources used: openSUSE Leap 15.2 (src): mupdf-1.12.0-lp152.6.3.1 openSUSE Backports SLE-15-SP3 (src): mupdf-1.12.0-bp153.2.3.1 openSUSE Backports SLE-15-SP2 (src): mupdf-1.12.0-bp152.4.3.1 openSUSE Backports SLE-15-SP1 (src): mupdf-1.12.0-bp151.4.3.1