EPSS
Percentile
35.1%
mupdf:buster is vulnerable to a Use After Free. The vulnerability exists when a valid page was followed by a page with invalid pixmap dimensions, causing bander - a static - to point to previously freed memory instead of a newband_writer.
git.ghostscript.com/?p=mupdf.git;h=96751b25462f83d6e16a9afaf8980b0c3f979c8b
bugs.ghostscript.com/show_bug.cgi?id=702253
security-tracker.debian.org/tracker/CVE-2020-16600