Multiple use-after-free vulnerabilities in the gx_image_enum_begin function in base/gxipixel.c in Ghostscript allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document. Upstream bug: https://bugs.ghostscript.com/show_bug.cgi?id=697596 Upstream patch: http://git.ghostscript.com/?p=ghostpdl.git;h=ecceafe3abba2714ef9b432035fe0739d9b1a283
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 1427442]
RHEL-7 and earlier versions are not affected : The double-free is a side effect of the upstream commit cffb5712b (http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=cffb5712b), which was introduced in ghostscript-9.21.
(In reply to Cedric Buissart from comment #2) > RHEL-7 and earlier versions are not affected : The double-free is a side > effect of the upstream commit cffb5712b > (http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=cffb5712b), which > was introduced in ghostscript-9.21. Please note that ghostscript-9.21 is already released, and I'm planning to do a rebase at some point when I have a time. Therefore I'm not sure we should close this BZ as a NOTABUG, because we might stumble upon this again in the future.