Upstream information

CVE-2022-2085 at MITRE

Description

A NULL pointer dereference vulnerability was found in Ghostscript, which occurs when it tries to render a large number of bits in memory. When allocating a buffer device, it relies on an init_device_procs defined for the device that uses it as a prototype that depends upon the number of bits per pixel. For bpp > 64, mem_x_device is used and does not have an init_device_procs defined. This flaw allows an attacker to parse a large number of bits (more than 64 bits per pixel), which triggers a NULL pointer dereference flaw, causing an application to crash.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 5.5 5.5
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector Local Local
Attack Complexity Low Low
Privileges Required None None
User Interaction Required Required
Scope Unchanged Unchanged
Confidentiality Impact None None
Integrity Impact None None
Availability Impact High High
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1200555 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
HPE Helion OpenStack 8 ghostscript Not affected
SUSE CaaS Platform 4.0 ghostscript Not affected
SUSE Enterprise Storage 6 ghostscript Not affected
SUSE Enterprise Storage 7 ghostscript Not affected
SUSE Enterprise Storage 7.1 ghostscript Not affected
SUSE Linux Enterprise Desktop 15 SP3 ghostscript Not affected
SUSE Linux Enterprise Desktop 15 SP4 ghostscript Not affected
SUSE Linux Enterprise High Performance Computing 12 SP5 ghostscript Not affected
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS ghostscript Not affected
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS ghostscript Not affected
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS ghostscript Not affected
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS ghostscript Not affected
SUSE Linux Enterprise High Performance Computing 15 SP3 ghostscript Not affected
SUSE Linux Enterprise High Performance Computing 15 SP4 ghostscript Not affected
SUSE Linux Enterprise High Performance Computing 15-LTSS ghostscript Not affected
SUSE Linux Enterprise Module for Basesystem 15 SP3 ghostscript Not affected
SUSE Linux Enterprise Module for Basesystem 15 SP4 ghostscript Not affected
SUSE Linux Enterprise Server 12 SP2-BCL ghostscript Not affected
SUSE Linux Enterprise Server 12 SP3-BCL ghostscript Not affected
SUSE Linux Enterprise Server 12 SP3-ESPOS ghostscript Not affected
SUSE Linux Enterprise Server 12 SP3-LTSS ghostscript Not affected
SUSE Linux Enterprise Server 12 SP4-ESPOS ghostscript Not affected
SUSE Linux Enterprise Server 12 SP4-LTSS ghostscript Not affected
SUSE Linux Enterprise Server 12 SP5 ghostscript Not affected
SUSE Linux Enterprise Server 15 SP1-LTSS ghostscript Not affected
SUSE Linux Enterprise Server 15 SP2-LTSS ghostscript Not affected
SUSE Linux Enterprise Server 15 SP3 ghostscript Not affected
SUSE Linux Enterprise Server 15 SP4 ghostscript Not affected
SUSE Linux Enterprise Server 15-ESPOS ghostscript Not affected
SUSE Linux Enterprise Server 15-LTSS ghostscript Not affected
SUSE Linux Enterprise Server Business Critical Linux 15 SP1 ghostscript Not affected
SUSE Linux Enterprise Server Business Critical Linux 15 SP2 ghostscript Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP3 ghostscript Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP4 ghostscript Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP5 ghostscript Not affected
SUSE Linux Enterprise Server for SAP Applications 15 ghostscript Not affected
SUSE Linux Enterprise Server for SAP Applications 15 SP1 ghostscript Not affected
SUSE Linux Enterprise Server for SAP Applications 15 SP2 ghostscript Not affected
SUSE Linux Enterprise Server for SAP Applications 15 SP3 ghostscript Not affected
SUSE Linux Enterprise Server for SAP Applications 15 SP4 ghostscript Not affected
SUSE Manager Proxy 4.1 ghostscript Not affected
SUSE Manager Proxy 4.2 ghostscript Not affected
SUSE Manager Proxy 4.3 ghostscript Not affected
SUSE Manager Retail Branch Server 4.1 ghostscript Not affected
SUSE Manager Retail Branch Server 4.2 ghostscript Not affected
SUSE Manager Retail Branch Server 4.3 ghostscript Not affected
SUSE Manager Server 4.1 ghostscript Not affected
SUSE Manager Server 4.2 ghostscript Not affected
SUSE Manager Server 4.3 ghostscript Not affected
SUSE OpenStack Cloud 8 ghostscript Not affected
SUSE OpenStack Cloud 9 ghostscript Not affected
SUSE OpenStack Cloud Crowbar 8 ghostscript Not affected
SUSE OpenStack Cloud Crowbar 9 ghostscript Not affected


SUSE Timeline for this CVE

CVE page created: Wed Jun 15 09:56:47 2022
CVE page last modified: Fri Nov 25 17:51:46 2022