ArchLinux: 202003-10: okular: arbitrary command execution
Summary
A security issue has been found in Okular before 1.10.0, that can be tricked into executing local binaries via specially crafted PDF files. This binary execution can require almost no user interaction. No parameters can be passed to those local binaries.
Resolution
Upgrade to 19.12.3-3.
# pacman -Syu "okular>=19.12.3-3"
The problem has been fixed upstream but no release is available yet.
References
https://kde.org/info/security/advisory-20200312-1.txt https://invent.kde.org/graphics/okular/-/commit/6a93a033b4f9248b3cd4d04689b8391df754e244 https://security.archlinux.org/CVE-2020-9359
Workaround
None.