When a crafted PDF is supplied to ghostscript-9.25, it triggers a use-after-free in igc_reloc_struct_ptr() of psi/igc.c on line 1279.
Upstream patch: https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=ece5cbbd9979cd35737b00e68267762d72feb2ea;hp=1ef5f08f2c2e27efa978f0010669ff22355c385f Upstream bug: https://bugs.ghostscript.com/show_bug.cgi?id=702851
Acknowledgments: Name: Todd Cullum (Red Hat) Upstream: Suhwan
Flaw summary: Improper handling of font could cause a use-after-free in igc_reloc_struct_ptr() when an attacker provided a crafted PDF file. The aforementioned upstream patch resolved this flaw.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1852 https://access.redhat.com/errata/RHSA-2021:1852
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-14373