Red Hat Bugzilla – Bug 1621363
CVE-2018-16542 ghostscript: .definemodifiedfont memory corruption if /typecheck is handled (699668)
Last modified: 2018-10-31 21:32:24 EDT
It was discovered that ghostscript did not properly handle certain stack overflow error conditions. A specially crafted PostScript document could exploit this to crash ghostscript or, possibly, execute arbitrary code in the context of the ghostscript process. Patch: http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=b575e1ec42
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 1625827]
Statement: This issue affects the versions of ghostscript as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Acknowledgments: Name: Tavis Ormandy (Google Project Zero)
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:2918 https://access.redhat.com/errata/RHSA-2018:2918