First published: Tue Aug 01 2023(Updated: )
A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript | <9.51 | |
Redhat Enterprise Linux | =8.0 | |
redhat/ghostscript | <9.51 | 9.51 |
Redhat Codeready Linux Builder | =8.0 | |
Redhat Codeready Linux Builder For Arm64 | =8.0_aarch64 | |
Redhat Codeready Linux Builder For Ibm Z Systems | =8.0_s390x | |
Redhat Codeready Linux Builder For Power Little Endian | =8.0_ppc64le | |
Redhat Enterprise Linux For Arm 64 | =8.0_aarch64 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0_s390x | |
Redhat Enterprise Linux For Power Little Endian | =8.0_ppc64le |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in ghostscript is CVE-2023-4042.
The severity of CVE-2023-4042 is medium with a CVSS score of 5.5.
The version affected by CVE-2023-4042 is up to exclusive 9.51.
The affected software for CVE-2023-4042 is ghostscript package as shipped with Red Hat Enterprise Linux 8.
To fix CVE-2023-4042, update to ghostscript version 9.51 or later.