Back to bug 2048939
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Marian Rehak | 2022-02-01 08:38:07 UTC | Blocks | 2048917 | |
| Michael J Gruber | 2022-02-01 14:25:12 UTC | Flags | needinfo?(mrehak) | |
| TEJ RATHI | 2022-02-02 16:53:34 UTC | Depends On | 2049765, 2049767, 2049766 | |
| TEJ RATHI | 2022-02-03 09:47:25 UTC | Doc Text | A heap-based-buffer-overflow flaw was found in Ghostscript GhostPDL in sampled_data_finish (called from sampled_data_continue and interp). An attacker could locally pass specially crafted malicious file to Ghostscript that will trigger heap-based-buffer-overflow, potentially causing a crash leading to a denial of service. | |
| RaTasha Tillery-Smith | 2022-02-03 16:35:34 UTC | Doc Text | A heap-based-buffer-overflow flaw was found in Ghostscript GhostPDL in sampled_data_finish (called from sampled_data_continue and interp). An attacker could locally pass specially crafted malicious file to Ghostscript that will trigger heap-based-buffer-overflow, potentially causing a crash leading to a denial of service. | A heap-based buffer overflow flaw was found in Ghostscript’s GhostPDL in the sampled_data_finish function (called from sampled_data_continue and interp). This flaw allows a local attacker to pass a specially crafted malicious file to Ghostscript that triggers a heap-based buffer overflow, potentially causing a crash that leads to a denial of service. |
| Marian Rehak | 2022-02-03 18:27:09 UTC | Flags | needinfo?(mrehak) | |
| Red Hat Bugzilla | 2023-07-07 08:35:33 UTC | Assignee | security-response-team | nobody |
Back to bug 2048939