ghostscript is vulnerable to denial of service. The vulnerability exists due to a NULL pointer dereference allowing an attacker to crash the system when rendering a large number of bits in memory.
CPE | Name | Operator | Version |
---|---|---|---|
ghostscript:sid | eq | 9.53.3~dfsg-5 | |
ghostscript:sid | eq | 9.53.3~dfsg-5 |
git.ghostscript.com/?p=ghostpdl.git%3Bh=ae1061d948d88667bdf51d47d918c4684d0f67df
git.ghostscript.com/?p=ghostpdl.git;h=ae1061d948d88667bdf51d47d918c4684d0f67df
bugs.ghostscript.com/show_bug.cgi?id=704945
bugzilla.redhat.com/show_bug.cgi?id=2095261
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERSZX5LKDWAHZWJYBMP2E2UHOPUCDEGV/
lists.fedoraproject.org/archives/list/[email protected]/message/ERSZX5LKDWAHZWJYBMP2E2UHOPUCDEGV/
security-tracker.debian.org/tracker/CVE-2022-2085
security.gentoo.org/glsa/202211-11