For more information on this vulnerability, read the complete advisory here.
There are also four Four use-after-free vulnerabilities. A specially crafted PDF document can trigger the reuse of previously free memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. For more information on these, check out their respective advisories.