MGASA-2021-0112

Source
https://advisories.mageia.org/MGASA-2021-0112.html
Import Source
https://advisories.mageia.org/MGASA-2021-0112.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0112
Upstream
Published
2021-03-04T16:53:32Z
Modified
2026-04-16T04:44:42.253739476Z
Summary
Updated xpdf packages fix security vulnerabilities
Details

In Xpdf 4.02, SplashOutputDev::endType3Char(GfxState *state) SplashOutputDev.cc:3079 is trying to use the freed t3GlyphStack->cache, which causes an heap-use-after-free problem. The codes of a previous fix for nested Type 3 characters wasn't correctly handling the case where a Type 3 char referred to another char in the same Type 3 font (CVE-2020-25725).

Xpdf 4.02 allows stack consumption because of an incorrect subroutine reference in a Type 1C font charstring, related to the FoFiType1C::getOp() function (CVE-2020-35376).

References
Credits

Affected packages

Mageia:7 / xpdf

Package

Name
xpdf
Purl
pkg:rpm/mageia/xpdf?arch=source&distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.03-1.mga7

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2021-0112.json"

Mageia:8 / xpdf

Package

Name
xpdf
Purl
pkg:rpm/mageia/xpdf?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.03-1.mga8

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2021-0112.json"