Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 702253: Avoid a use-after-free in fz_drop_band_writer #14

Closed
wants to merge 1 commit into from
Closed

Bug 702253: Avoid a use-after-free in fz_drop_band_writer #14

wants to merge 1 commit into from

Conversation

theshoals
Copy link
Contributor

A use-after-free would occur when a valid page was followed by
a page with invalid pixmap dimensions, causing bander --
a static -- to point to previously freed memory instead of a new
band_writer.

A use-after-free would occur when a valid page was followed by
a page with invalid pixmap dimensions, causing bander --
a static -- to point to previously freed memory instead of a new
band_writer.
@theshoals
Copy link
Contributor Author

theshoals commented May 5, 2020

Committed: 96751b2

@theshoals theshoals closed this May 5, 2020
@theshoals theshoals deleted the fix-bug-702253 branch May 5, 2020 23:03
GerHobbelt pushed a commit to GerHobbelt/mupdf that referenced this pull request Dec 9, 2022
$ ./build/sanitize/mutool draw -Dst ./x/tiff/segfault/goat.tiff
page ./x/tiff/segfault/goat.tiff 1AddressSanitizer:DEADLYSIGNAL
=================================================================
==3377970==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000018 (pc 0x55dfed459a1b bp 0x7ffecf93ebc0 sp 0x7ffecf93eac0 T0)
==3377970==The signal is caused by a READ memory access.
==3377970==Hint: address points to the zero page.
    #0 0x55dfed459a1b in fz_convert_pixmap_samples source/fitz/colorspace.c:1421
    #1 0x55dfed57bad0 in fz_convert_pixmap source/fitz/pixmap.c:1065
    #2 0x55dfed481194 in convert_pixmap_for_painting source/fitz/draw-device.c:1682
    ArtifexSoftware#3 0x55dfed482e2c in fz_draw_fill_image source/fitz/draw-device.c:1852
    ArtifexSoftware#4 0x55dfed461d34 in fz_fill_image source/fitz/device.c:351
    ArtifexSoftware#5 0x55dfed7841a0 in img_run_page source/cbz/muimg.c:105
    ArtifexSoftware#6 0x55dfed466fe9 in fz_run_page_contents source/fitz/document.c:642
    ArtifexSoftware#7 0x55dfed467358 in fz_run_page source/fitz/document.c:692
    ArtifexSoftware#8 0x55dfed3ebbc9 in drawband source/tools/mudraw.c:624
    ArtifexSoftware#9 0x55dfed3f0e91 in dodrawpage source/tools/mudraw.c:1125
    ArtifexSoftware#10 0x55dfed3f32c1 in drawpage source/tools/mudraw.c:1460
    ArtifexSoftware#11 0x55dfed3f3716 in drawrange source/tools/mudraw.c:1499
    ArtifexSoftware#12 0x55dfed3f8fcf in mudraw_main source/tools/mudraw.c:2501
    ArtifexSoftware#13 0x55dfed3e9736 in main source/tools/mutool.c:152
    ArtifexSoftware#14 0x7fae19829209 in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
    ArtifexSoftware#15 0x7fae198292bb in __libc_start_main_impl ../csu/libc-start.c:389
    ArtifexSoftware#16 0x55dfed3e8f60 in _start (/home/sebras/src/mupdf/build/sanitize/mutool+0x21bf60)
FelixEngl pushed a commit to FelixEngl/mupdf that referenced this pull request Sep 8, 2024
* build: make build flags features

* build: use pkg-config crate for more robust library handling

* build: revert to inverse handling of HAVE_* flags

* build: remove useless features
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant