First published: Thu Aug 13 2020(Updated: )
A null pointer dereference vulnerability in compose_group_nonknockout_nonblend_isolated_allmask_common() in base/gxblend.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ghostscript | <0:9.27-1.el8 | 0:9.27-1.el8 |
redhat/ghostscript | <9.51 | 9.51 |
Ghostscript | <9.52 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
debian/ghostscript | 9.53.3~dfsg-7+deb11u7 9.53.3~dfsg-7+deb11u9 10.0.0~dfsg-11+deb12u6 10.04.0~dfsg-2 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 |
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=7870f4951bcc6a153f317e3439e14d0e929fd231
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16293
The severity of CVE-2020-16293 is medium with a severity value of 5.5.
CVE-2020-16293 allows a remote attacker to cause a denial of service in Artifex Software GhostScript v9.50 via a crafted PDF file.
To fix the null pointer dereference vulnerability in GhostScript, you should update to version 9.51, which has the fix for this vulnerability.
You can find more information about CVE-2020-16293 on the following references: [Link1](https://bugs.ghostscript.com/show_bug.cgi?id=701795), [Link2](https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=7870f4951bcc6a153f317e3439e14d0e929fd231), [Link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1870233).