ArchLinux: 201608-22: mupdf: arbitrary code execution
Summary
Yu Hong and Zheng Jihong discovered a heap overflow vulnerability within the pdf_load_mesh_params function, allowing an attacker to cause an application crash (denial-of-service), or potentially to execute arbitrary code with the privileges of the user running MuPDF, if a specially crafted PDF file is processed.
Resolution
Upgrade to 1.9a-5
# pacman -Syu "mupdf>=1.9a-5"
The fix has been backported from an upstream patch.
References
https://bugs.ghostscript.com/show_bug.cgi https://security-tracker.debian.org/tracker/CVE-2016-6525 https://git.ghostscript.com/;a=commitdiff;h=39b0f07dd960f34e7e6bf230ffc3d87c41ef0f2e;hp=fa1936405b6a84e5c9bb440912c23d532772f958
Workaround
None.