Back to bug 2048916
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Marian Rehak | 2022-02-01 07:59:44 UTC | Blocks | 2048917 | |
| Michael J Gruber | 2022-02-01 14:25:02 UTC | Flags | needinfo?(mrehak) | |
| TEJ RATHI | 2022-02-02 16:54:58 UTC | Depends On | 2049768, 2049770, 2049769 | |
| TEJ RATHI | 2022-02-03 09:41:57 UTC | Doc Text | A heap-use-after-free flaw was found in Ghostscript GhostPDL in sampled_data_sample (called from sampled_data_continue and interp). An attacker could locally pass specially crafted malicious file to Ghostscript that will trigger heap-use-after-free, potentially causing a crash leading to a denial of service. | |
| RaTasha Tillery-Smith | 2022-02-03 16:30:30 UTC | Doc Text | A heap-use-after-free flaw was found in Ghostscript GhostPDL in sampled_data_sample (called from sampled_data_continue and interp). An attacker could locally pass specially crafted malicious file to Ghostscript that will trigger heap-use-after-free, potentially causing a crash leading to a denial of service. | A heap-use-after-free flaw was found in Ghostscript’s GhostPDL in the sampled_data_sample function (called from sampled_data_continue and interp). This flaw allows a local attacker to pass a specially crafted malicious file to Ghostscript that triggers a heap-use-after-free issue, potentially causing a crash that leads to a denial of service. |
| Marian Rehak | 2022-02-03 18:26:28 UTC | Flags | needinfo?(mrehak) | needinfo?(mjg) |
| Michael J Gruber | 2022-02-03 19:30:10 UTC | Flags | needinfo?(mjg) | |
| Red Hat Bugzilla | 2023-07-07 08:32:45 UTC | Assignee | security-response-team | nobody |
Back to bug 2048916