First published: Tue Mar 21 2017(Updated: )
A null pointer vulnerability was found in mem_get_bits_rectangle() when trying to read from unallocated memory. Upstream bug: <a href="https://bugs.ghostscript.com/show_bug.cgi?id=697676">https://bugs.ghostscript.com/show_bug.cgi?id=697676</a> Upstream patch: <a href="http://git.ghostscript.com/?p=ghostpdl.git;h=309eca4e0a31ea70dcc844812691439312dad091">http://git.ghostscript.com/?p=ghostpdl.git;h=309eca4e0a31ea70dcc844812691439312dad091</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1434353 is considered medium due to its potential to cause null pointer dereference.
To fix REDHAT-BUG-1434353, apply the upstream patch provided in the Ghostscript repository.
REDHAT-BUG-1434353 affects Ghostscript software.
Yes, there is an upstream bug report for REDHAT-BUG-1434353 which can be found detailed on the Ghostscript bug tracking page.
The vulnerability in REDHAT-BUG-1434353 is caused by a null pointer dereference when reading from unallocated memory.