Back to bug 2048939

Who When What Removed Added
Marian Rehak 2022-02-01 08:38:07 UTC Blocks 2048917
Michael J Gruber 2022-02-01 14:25:12 UTC Flags needinfo?(mrehak)
TEJ RATHI 2022-02-02 16:53:34 UTC Depends On 2049765, 2049767, 2049766
TEJ RATHI 2022-02-03 09:47:25 UTC Doc Text A heap-based-buffer-overflow flaw was found in Ghostscript GhostPDL in sampled_data_finish (called from sampled_data_continue and interp). An attacker could locally pass specially crafted malicious file to Ghostscript that will trigger heap-based-buffer-overflow, potentially causing a crash leading to a denial of service.
RaTasha Tillery-Smith 2022-02-03 16:35:34 UTC Doc Text A heap-based-buffer-overflow flaw was found in Ghostscript GhostPDL in sampled_data_finish (called from sampled_data_continue and interp). An attacker could locally pass specially crafted malicious file to Ghostscript that will trigger heap-based-buffer-overflow, potentially causing a crash leading to a denial of service. A heap-based buffer overflow flaw was found in Ghostscript’s GhostPDL in the sampled_data_finish function (called from sampled_data_continue and interp). This flaw allows a local attacker to pass a specially crafted malicious file to Ghostscript that triggers a heap-based buffer overflow, potentially causing a crash that leads to a denial of service.
Marian Rehak 2022-02-03 18:27:09 UTC Flags needinfo?(mrehak)
Red Hat Bugzilla 2023-07-07 08:35:33 UTC Assignee security-response-team nobody

Back to bug 2048939