A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
https://www.securityweek.com/atlassian-patches-vulnerabilities-in-bitbucket-confluence-jira/
https://about.gitlab.com/releases/2024/05/22/patch-release-gitlab-17-0-1-released/
https://www.mozilla.org/security/advisories/mfsa2024-23/
https://www.mozilla.org/security/advisories/mfsa2024-22/
https://www.mozilla.org/security/advisories/mfsa2024-21/
https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html
https://github.com/mozilla/pdf.js/releases/tag/v4.2.67
https://github.com/gogs/gogs/issues/7928
https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/