In MuPDF 1.12.0 and earlier, multiple reachable assertions in the PDF parser allow an attacker to cause a denial of service (assert crash) via a crafted file. References: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564 Patches: http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=71ceebcf56e682504da22c4035b39a2d451e8ffd;hp=7f82c01523505052615492f8e220f4348ba46995 http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=8a3257b01faa899dd9b5e35c6bb3403cd709c371;hp=de39f005f12a1afc6973c1f5cec362d6545f70cb http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a;hp=f51836b9732c38d945b87fda0770009a77ba680c
Created mupdf tracking bugs for this issue: Affects: fedora-all [bug 1582316]
Fixed in 1.13.0 Closing here since 1582316 is bogus (tracker should be here and depend on various blockers against mupdf, not the other way round).