Hello. Look. There is a bug in ghostscript: http://bugs.ghostscript.com/show_bug.cgi?id=687818 I've moved to 8.15 and everything works much better. I think it's good time to make it stable. Reproducible: Always Steps to Reproduce:
If real, this *could* be exploited by using a malicious PDF file. printing herd / x86 team : please test and mark 8.15 stable, as it seems to be stable anyway.
stable on x86
Security, please vote on GLSA.
Without more information, we won't issue a GLSA. Someone with time should reproduce and look at the diff to see what was fixed and if it's exploitable.
Seems like a job for auditing.
Yep, agreeing with comments #4, #5
There are a lot of SEGV fixes in gs. We'll suppose these are not exploitable, unless proves otherwise. Switching to auditing as this package may be a nice target.
fwiw the bug referenced below is a segfault due to a huge stack, can't see it being exploitable (not that I'm an expert).
s/below/above/ ;)
so...
so it's CLOSED as a fixed non-security issue.