In Artifex MuPDF 1.12.0 and earlier, multiple memory leaks in the PDF parser allow an attacker to cause a denial of service (memory leak) via a crafted file.
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Link | Tags |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5502 | third party advisory issue tracking exploit |
https://security.gentoo.org/glsa/201811-15 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/09/msg00013.html | third party advisory mailing list |
https://bugs.ghostscript.com/show_bug.cgi?id=698887 | |
https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=8aa2bd34065d2844aae778bd4cc20c74bbcd9406 |