• The /W array was not sanitized, possibly causing an integer overflow
    in a multiplication. An analysis of the code suggests that there were
    no possible exploits based on this since the problems were in checking
    expected values but bounds checks were performed on actual values.
    Jay Berkenbilt authored
     
    Browse File »



  • Space rather than newline after xref, missing /ID in trailer for
    encrypted file.  This enables qpdf to handle some files that xpdf can
    handle.  Adobe reader can't necessarily handle them.
    Jay Berkenbilt authored
     
    Browse File »