ghostscript is vulnerable to denial of service. The vulnerability exists due to a memory corruption. An attacker is able to override file access controls by using non-standard PostScript that resulted in a size that was too large, and could underflow to max uint32_t.
CPE | Name | Operator | Version |
---|---|---|---|
ghostscript:3.12 | eq | 9.52-r0 | |
ghostscript:3.11 | eq | 9.50-r0 | |
ghostscript:3.12 | eq | 9.52-r0 | |
ghostscript:3.11 | eq | 9.50-r0 |
git.ghostscript.com/?p=ghostpdl.git;a=log
lists.opensuse.org/opensuse-security-announce/2020-08/msg00004.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00006.html
artifex.com/security-advisories/CVE-2020-15900
git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5d499272b95a6b890a1397e11d20937de000d31b
github.com/ArtifexSoftware/ghostpdl/commit/5d499272b95a6b890a1397e11d20937de000d31b
github.com/ArtifexSoftware/ghostpdl/commits/master/psi/zstring.c
secdb.alpinelinux.org/v3.12/main.yaml
security.gentoo.org/glsa/202008-20
usn.ubuntu.com/4445-1/