A buffer overflow vulnerability in pcx_write_rle() in contrib/japanese/gdev10v.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. References: https://bugs.ghostscript.com/show_bug.cgi?id=701819 https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2793769ff107d8d22dadd30c6e68cd781b569550
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 1870260]
Flaw summary: Incorrect if statement conditional order in pcx_write_rle() could allow the dereference of an out-of-bounds pointer `from`. This is possible because there is a while loop in which `from` is incremented before the line: if (data != *from || from == end) Therefore, it's possible that from is incremented past the end of the buffer and then dereferenced in the first comparison. The patch reverses these comparisons to ensure that is not possible.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1852 https://access.redhat.com/errata/RHSA-2021:1852
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-16305