DEBIAN-CVE-2016-8729

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2016-8729
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2016-8729.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2016-8729
Upstream
Published
2018-04-24T19:29:00Z
Modified
2025-09-19T06:09:13Z
Summary
[none]
Details

An exploitable memory corruption vulnerability exists in the JBIG2 parser of Artifex MuPDF 1.9. A specially crafted PDF can cause a negative number to be passed to a memset resulting in memory corruption and potential code execution. An attacker can specially craft a PDF and send to the victim to trigger this vulnerability.

References

Affected packages

Debian:11 / jbig2dec

Package

Name
jbig2dec
Purl
pkg:deb/debian/jbig2dec?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / jbig2dec

Package

Name
jbig2dec
Purl
pkg:deb/debian/jbig2dec?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / jbig2dec

Package

Name
jbig2dec
Purl
pkg:deb/debian/jbig2dec?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / jbig2dec

Package

Name
jbig2dec
Purl
pkg:deb/debian/jbig2dec?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}