Bug 2095261 (CVE-2022-2085) - CVE-2022-2085 ghostscript: Null pointer dereference in gx_default_create_buf_device()
Summary: CVE-2022-2085 ghostscript: Null pointer dereference in gx_default_create_buf_...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-2085
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2097175
Blocks: 2095268 2097177
TreeView+ depends on / blocked
 
Reported: 2022-06-09 11:39 UTC by TEJ RATHI
Modified: 2022-06-15 12:19 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A NULL pointer dereference vulnerability was found in Ghostscript, which occurs when it tries to render a large number of bits in memory. When allocating a buffer device, it relies on an init_device_procs defined for the device that uses it as a prototype that depends upon the number of bits per pixel. For bpp > 64, mem_x_device is used and does not have an init_device_procs defined. This flaw allows an attacker to parse a large number of bits (more than 64 bits per pixel), which triggers a NULL pointer dereference flaw, causing an application to crash.
Clone Of:
Environment:
Last Closed: 2022-06-15 11:51:42 UTC
Embargoed:


Attachments (Terms of Use)

Description TEJ RATHI 2022-06-09 11:39:50 UTC
Null pointer dereference flaw was found in gx_default_create_buf_device().

https://bugs.ghostscript.com/show_bug.cgi?id=704945
http://git.ghostscript.com/?p=ghostpdl.git;h=ae1061d948d88667bdf51d47d918c4684d0f67df

Comment 2 TEJ RATHI 2022-06-15 04:50:37 UTC
Created ghostscript tracking bugs for this issue:

Affects: fedora-all [bug 2097175]

Comment 4 Product Security DevOps Team 2022-06-15 11:51:40 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-2085


Note You need to log in before you can comment on or make changes to this bug.