CVE-2017-7264

NameCVE-2017-7264
DescriptionUse-after-free vulnerability in the fz_subsample_pixmap function in fitz/pixmap.c in Artifex MuPDF 1.10a allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted document.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3797-1
Debian Bugs854734

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mupdf (PTS)bullseye1.17.0+ds1-2fixed
bullseye (security)1.17.0+ds1-1.3~deb11u1fixed
bookworm1.21.1+ds2-1fixed
sid, trixie1.24.10+ds1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mupdfsourcewheezy(not affected)
mupdfsourcejessie1.5-1+deb8u2DSA-3797-1
mupdfsource(unstable)1.9a+ds1-3854734

Notes

[wheezy] - mupdf <not-affected> (vulnerable code not present)
https://bugs.ghostscript.com/show_bug.cgi?id=697515
Fix https://git.ghostscript.com/?p=mupdf.git;h=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27
https://blogs.gentoo.org/ago/2017/02/09/mupdf-use-after-free-in-fz_subsample_pixmap-pixmap-c/
Related to CVE-2017-5896. But CVE-2017-7264 is for the use-after-free
vulnerability whereas CVE-2017-5896 is for the hea-based buffer overflow
in fz_subsample_pixmap.

Search for package or bug name: Reporting problems