OSV-2020-1871

See a problem?
Import Source
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ghostscript/OSV-2020-1871.yaml
JSON Data
https://api.osv.dev/v1/vulns/OSV-2020-1871
Published
2020-09-29T00:00:17.109944Z
Modified
2022-04-13T03:04:34.849081Z
Summary
Segv on unknown address in s_DCTD_process
Details

OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21416

Crash type: Segv on unknown address
Crash state:
s_DCTD_process
sreadbuf
s_process_read_buf
References

Affected packages

OSS-Fuzz / ghostscript

Package

Name
ghostscript
Purl
pkg:generic/ghostscript

Affected ranges

Type
GIT
Repo
git://git.ghostscript.com/ghostpdl.git
Events
Introduced
bd73d0c1d0c42fd1671b56f1277b5e9f25391907
Fixed
d703f355af5292e61dcd641332e249873ab5fb8a
Fixed
7876dd15467571e7c96241d763aa270e32f4b4d1

Affected versions

ghostpdl-9.*

ghostpdl-9.51
ghostpdl-9.51rc1
ghostpdl-9.51rc2
ghostpdl-9.51rc2_test
ghostpdl-9.51rc2_test2
ghostpdl-9.51rc3
ghostpdl-9.52
ghostpdl-9.52-test-base-1
ghostpdl-9.52-test-base-2
ghostpdl-9.52-test-base-3
ghostpdl-9.52-test-base-4
ghostpdl-9.52.1

ghostscript-9.*

ghostscript-9.51
ghostscript-9.52

Ecosystem specific

{
    "fixed_range": "bad9f11895cbb4c0f53b7b0ef8f3502789d81315:d703f355af5292e61dcd641332e249873ab5fb8a"
}