An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact. External Reference: https://www.kb.cert.org/vuls/id/332928 Upstream Bug: https://bugs.ghostscript.com/show_bug.cgi?id=699671 Upstream Patch: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ea735ba3
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 1625837]
Statement: This issue did not affect the versions of ghostscript as shipped with Red Hat Enterprise Linux 5, 6, and 7.