A use-after-free vulnerability was found in MuPDF, triggered by a crafted PDF file. Upstream patch: http://git.ghostscript.com/?p=mupdf.git;h=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27 References: https://blogs.gentoo.org/ago/2017/02/09/mupdf-use-after-free-in-fz_subsample_pixmap-pixmap-c/
Created mupdf tracking bugs for this issue: Affects: fedora-all [bug 1436293]
http://pkgs.fedoraproject.org/cgit/rpms/mupdf.git/tree/mupdf-bug-697515-Fix-out-of-bounds-read-in-fz_subsample_pi.patch