First published: Tue Aug 01 2023(Updated: )
A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ghostscript | <9.51 | 9.51 |
Ghostscript | <9.51 | |
redhat codeready Linux builder | =8.0 | |
redhat codeready linux builder for arm64 | =8.0_aarch64 | |
redhat codeready linux builder for ibm z systems | =8.0_s390x | |
redhat codeready Linux builder for power little endian | =8.0_ppc64le | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux for arm 64 | =8.0_aarch64 | |
redhat enterprise Linux for ibm z systems | =8.0_s390x | |
redhat enterprise Linux for power little endian | =8.0_ppc64le |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in ghostscript is CVE-2023-4042.
The severity of CVE-2023-4042 is medium with a CVSS score of 5.5.
The version affected by CVE-2023-4042 is up to exclusive 9.51.
The affected software for CVE-2023-4042 is ghostscript package as shipped with Red Hat Enterprise Linux 8.
To fix CVE-2023-4042, update to ghostscript version 9.51 or later.