Red Hat Bugzilla – Bug 1642584
CVE-2018-18073 ghostscript: saved execution stacks can leak operator arrays
Last modified: 2018-11-02 09:49:53 EDT
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object. References: http://www.openwall.com/lists/oss-security/2018/10/10/12 https://bugs.chromium.org/p/project-zero/issues/detail?id=1690 Upstream Patch: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=34cc326eb2c5695833361887fe0b32e8d987741c
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 1642585]