It was discovered the Ghostscript incorrectly handled memory when processing certain inputs. By tricking a user into opening a specially crafted PDF file, an attacker could cause the program to crash.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "9.26~dfsg+0-0ubuntu0.16.04.14+esm4",
"binary_name": "ghostscript"
},
{
"binary_version": "9.26~dfsg+0-0ubuntu0.16.04.14+esm4",
"binary_name": "ghostscript-x"
},
{
"binary_version": "9.26~dfsg+0-0ubuntu0.16.04.14+esm4",
"binary_name": "libgs-dev"
},
{
"binary_version": "9.26~dfsg+0-0ubuntu0.16.04.14+esm4",
"binary_name": "libgs9"
},
{
"binary_version": "9.26~dfsg+0-0ubuntu0.16.04.14+esm4",
"binary_name": "libgs9-common"
}
]
}
{
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-27792"
}
],
"ecosystem": "Ubuntu:Pro:16.04:LTS"
}