{"id":"USN-7825-1","summary":"mupdf vulnerabilities","details":"It was discovered that MuPDF incorrectly managed memory, resulting in a\nmemory leak. An attacker could possibly use this issue to cause a denial\nof service. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-1000036)\n\nIt was discovered that MuPDF could enter an infinite loop when parsing\ncertain PDF files. An attacker could possibly use this issue to cause a\ndenial of service. This issue only affected Ubuntu 18.04 LTS.\n(CVE-2018-10289)\n\nIt was discovered that MuPDF incorrectly managed memory, possibly leading\nto a segmentation fault. An attacker could possibly use this issue to\ncause a denial of service. This issue only affected Ubuntu 18.04 LTS.\n(CVE-2018-16647, CVE-2018-16648)\n\nIt was discovered that MuPDF contained a use-after-free vulnerability.\nAn attacker could possibly use this issue to cause a denial of service.\nThis issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.\n(CVE-2020-21896)\n\nIt was discovered that MuPDF incorrectly managed memory, resulting in a\nmemory leak. An attacker could possibly use this issue to cause a denial\nof service or obtain sensitive information. This issue only affected\nUbuntu 20.04 LTS. (CVE-2020-26683)\n\nMaxim Mishechkin, Vitalii Akolzin, Shamil Kurmangaleev, Denis Straghkov,\nFedor Nis'kov and Ivan Gulakov discovered that MuPDF incorrectly managed\nmemory under certain circumstances, leading to a double-free. An attacker\ncould possibly use this to cause a denial of service. This issue only\naffected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.\n(CVE-2021-3407)\n\nXuwei Liu discovered that MuPDF may perform an out-of-bounds write under\ncertain circumstances. An attacker could possibly use this issue to cause\na denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu\n20.04 LTS. (CVE-2021-37220)","modified":"2026-04-22T11:03:08.096268Z","published":"2025-10-16T03:05:55Z","related":["UBUNTU-CVE-2018-1000036","UBUNTU-CVE-2018-10289","UBUNTU-CVE-2018-16647","UBUNTU-CVE-2018-16648","UBUNTU-CVE-2020-21896","UBUNTU-CVE-2020-26683","UBUNTU-CVE-2021-3407","UBUNTU-CVE-2021-37220"],"upstream":["CVE-2018-1000036","CVE-2018-10289","CVE-2018-16647","CVE-2018-16648","CVE-2020-21896","CVE-2020-26683","CVE-2021-3407","CVE-2021-37220","UBUNTU-CVE-2018-1000036","UBUNTU-CVE-2018-10289","UBUNTU-CVE-2018-16647","UBUNTU-CVE-2018-16648","UBUNTU-CVE-2020-21896","UBUNTU-CVE-2020-26683","UBUNTU-CVE-2021-3407","UBUNTU-CVE-2021-37220"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7825-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10289"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16647"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16648"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000036"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-21896"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26683"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3407"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-37220"}],"affected":[{"package":{"name":"mupdf","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/mupdf@1.7a-1ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.7a-1ubuntu0.1~esm1"}]}],"versions":["1.7-1","1.7a-1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.7a-1ubuntu0.1~esm1","binary_name":"mupdf"},{"binary_version":"1.7a-1ubuntu0.1~esm1","binary_name":"mupdf-tools"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7825-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3407"}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"mupdf","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/mupdf@1.12.0+ds1-1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.12.0+ds1-1ubuntu0.1~esm1"}]}],"versions":["1.11+ds1-1.1","1.11+ds1-2","1.12.0+ds1-1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.12.0+ds1-1ubuntu0.1~esm1","binary_name":"mupdf"},{"binary_version":"1.12.0+ds1-1ubuntu0.1~esm1","binary_name":"mupdf-tools"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7825-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-10289"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-16647"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-16648"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2018-1000036"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-21896"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3407"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-37220"}],"ecosystem":"Ubuntu:Pro:18.04:LTS"}}},{"package":{"name":"mupdf","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/mupdf@1.16.1+ds1-1ubuntu1+esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.16.1+ds1-1ubuntu1+esm1"}]}],"versions":["1.15.0+ds1-1","1.16.1+ds1-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.16.1+ds1-1ubuntu1+esm1","binary_name":"mupdf"},{"binary_version":"1.16.1+ds1-1ubuntu1+esm1","binary_name":"mupdf-tools"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7825-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-21896"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-26683"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3407"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-37220"}],"ecosystem":"Ubuntu:Pro:20.04:LTS"}}}],"schema_version":"1.7.5"}