First published: Tue May 18 2021(Updated: )
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.<br>The following packages have been upgraded to a later upstream version: ghostscript (9.27). (BZ#1874523)<br>Security Fix(es):<br><li> ghostscript: use-after-free vulnerability in igc_reloc_struct_ptr() could result in DoS (CVE-2020-14373)</li> <li> ghostscript: buffer overflow in lprn_is_black() in contrib/lips4/gdevlprn.c could result in a DoS (CVE-2020-16287)</li> <li> ghostscript: buffer overflow in pj_common_print_page() in devices/gdevpjet.c could result in a DoS (CVE-2020-16288)</li> <li> ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a DoS (CVE-2020-16290)</li> <li> ghostscript: buffer overflow in contrib/gdevdj9.c could result in a DoS (CVE-2020-16291)</li> <li> ghostscript: buffer overflow in mj_raster_cmd() in contrib/japanese/gdevmjc.c could result in a DoS (CVE-2020-16292)</li> <li> ghostscript: NULL pointer dereference in compose_group_nonknockout_nonblend_isolated_allmask_common() in base/gxblend.c could result in a DoS (CVE-2020-16293)</li> <li> ghostscript: buffer overflow in epsc_print_page() in devices/gdevepsc.c could result in a DoS (CVE-2020-16294)</li> <li> ghostscript: NULL pointer dereference in clj_media_size() in devices/gdevclj.c could result in a DoS (CVE-2020-16295)</li> <li> ghostscript: buffer overflow in GetNumWrongData() in contrib/lips4/gdevlips.c could result in a DoS (CVE-2020-16296)</li> <li> ghostscript: buffer overflow in FloydSteinbergDitheringC() in contrib/gdevbjca.c could result in a DoS (CVE-2020-16297)</li> <li> ghostscript: buffer overflow in mj_color_correct() in contrib/japanese/gdevmjc.c could result in a DoS (CVE-2020-16298)</li> <li> ghostscript: division by zero in bj10v_print_page() in contrib/japanese/gdev10v.c could result in a DoS (CVE-2020-16299)</li> <li> ghostscript: buffer overflow in tiff12_print_page() in devices/gdevtfnx.c could result in a DoS (CVE-2020-16300)</li> <li> ghostscript: buffer overflow in okiibm_print_page1() in devices/gdevokii.c could result in a DoS (CVE-2020-16301)</li> <li> ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a privilege escalation (CVE-2020-16302)</li> <li> ghostscript: use-after-free in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation (CVE-2020-16303)</li> <li> ghostscript: buffer overflow in image_render_color_thresh() in base/gxicolor.c could result in a DoS (CVE-2020-16304)</li> <li> ghostscript: NULL pointer dereference in devices/gdevtsep.c could result in a DoS (CVE-2020-16306)</li> <li> ghostscript: NULL pointer dereference in devices/vector/gdevtxtw.c and psi/zbfont.c could result in a DoS (CVE-2020-16307)</li> <li> ghostscript: buffer overflow in p_print_image() in devices/gdevcdj.c could result in a DoS (CVE-2020-16308)</li> <li> ghostscript: buffer overflow in lxm5700m_print_page() in devices/gdevlxm.c could result in a DoS (CVE-2020-16309)</li> <li> ghostscript: division by zero in dot24_print_page() in devices/gdevdm24.c could result in a DoS (CVE-2020-16310)</li> <li> ghostscript: buffer overflow in GetNumSameData() in contrib/lips4/gdevlips.c could result in a DoS (CVE-2020-17538)</li> <li> ghostscript: buffer overflow in cif_print_page() in devices/gdevcif.c could result in a DoS (CVE-2020-16289)</li> <li> ghostscript: buffer overflow in pcx_write_rle() in contrib/japanese/gdev10v.c could result in a DoS (CVE-2020-16305)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ghostscript | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-debugsource | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-debugsource | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-gtk-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-gtk-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-x11 | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-x11-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-x11-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/libgs | <9.27-1.el8 | 9.27-1.el8 |
redhat/libgs | <9.27-1.el8 | 9.27-1.el8 |
redhat/libgs-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/libgs-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-x11 | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-debugsource | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-gtk-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-x11 | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-x11-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/libgs | <9.27-1.el8 | 9.27-1.el8 |
redhat/libgs-debuginfo | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/ghostscript-debuginfo | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/ghostscript-debugsource | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/ghostscript-gtk-debuginfo | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/ghostscript-x11 | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/ghostscript-x11-debuginfo | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/libgs | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/libgs-debuginfo | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/ghostscript-doc | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-tools-dvipdf | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-tools-fonts | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-tools-printing | <9.27-1.el8 | 9.27-1.el8 |
redhat/libgs-devel | <9.27-1.el8 | 9.27-1.el8 |
redhat/libgs-devel | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-tools-dvipdf | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/ghostscript-tools-fonts | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/ghostscript-tools-printing | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/libgs-devel | <9.27-1.el8.aa | 9.27-1.el8.aa |
redhat/ghostscript-tools-dvipdf | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-tools-fonts | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-tools-printing | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-tools-dvipdf | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-tools-fonts | <9.27-1.el8 | 9.27-1.el8 |
redhat/ghostscript-tools-printing | <9.27-1.el8 | 9.27-1.el8 |
redhat/libgs-devel | <9.27-1.el8 | 9.27-1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.