0.082 Low
EPSS
Percentile
94.4%
It was found that the ghostscript function .setdevice suffered a use-after-free vulnerability due to an incorrect reference count. A specially crafted postscript document could trigger code execution in the context of the gs process.
bugzilla.redhat.com/show_bug.cgi?id=1382300