First published: Wed Apr 05 2023(Updated: )
In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written. <a href="https://bugs.ghostscript.com/show_bug.cgi?id=706494">https://bugs.ghostscript.com/show_bug.cgi?id=706494</a> <a href="https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=37ed5022cecd584de868933b5b60da2e995b3179">https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=37ed5022cecd584de868933b5b60da2e995b3179</a> <a href="https://ghostscript.readthedocs.io/en/latest/News.html">https://ghostscript.readthedocs.io/en/latest/News.html</a> <a href="https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html">https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ghostscript | <=10.01.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2184585 is high due to the potential for data corruption and security implications.
To fix REDHAT-BUG-2184585, upgrade to a version of Artifex Ghostscript later than 10.01.0 where the vulnerability is patched.
Artifex Ghostscript versions up to and including 10.01.0 are affected by REDHAT-BUG-2184585.
REDHAT-BUG-2184585 includes vulnerabilities related to buffer overflow in the PostScript interpreter affecting several encoding functions.
Yes, Red Hat is actively addressing REDHAT-BUG-2184585 through released patches and updates for affected software.