In MuPDF 1.12.0 and earlier, a stack buffer overflow in function pdf_lookup_cmap_full in pdf/pdf-cmap.c could allow an attacker to execute arbitrary code via a crafted file. References: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5494 Patch: http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=71ceebcf56e682504da22c4035b39a2d451e8ffd;hp=7f82c01523505052615492f8e220f4348ba46995 http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=f597300439e62f5e921f0d7b1e880b5c1a1f1607;hp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
Created mupdf tracking bugs for this issue: Affects: fedora-all [bug 1582316]
Fixed in 1.13.0 Closing here since 1582316 is bogus (tracker should be here and depend on various blockers against mupdf, not the other way round).