{"id":"RHSA-2021:1852","summary":"Red Hat Security Advisory: ghostscript security, bug fix, and enhancement update","modified":"2026-01-27T10:40:02.286744Z","published":"2024-09-16T05:10:00Z","upstream":["CVE-2020-14373","CVE-2020-16287","CVE-2020-16288","CVE-2020-16289","CVE-2020-16290","CVE-2020-16291","CVE-2020-16292","CVE-2020-16293","CVE-2020-16294","CVE-2020-16295","CVE-2020-16296","CVE-2020-16297","CVE-2020-16298","CVE-2020-16299","CVE-2020-16300","CVE-2020-16301","CVE-2020-16302","CVE-2020-16303","CVE-2020-16304","CVE-2020-16305","CVE-2020-16306","CVE-2020-16307","CVE-2020-16308","CVE-2020-16309","CVE-2020-16310","CVE-2020-17538"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870149"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870152"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870159"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870162"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870165"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870167"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870169"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870175"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870179"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870227"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870229"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870231"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870237"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870240"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870242"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870244"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870248"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870249"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870256"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870257"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870258"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870262"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870266"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870267"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1873239"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1874523"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1899902"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1852.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-14373"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-14373"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14373"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16287"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16287"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16287"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16288"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16288"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16288"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16289"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16289"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16289"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16290"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16290"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16290"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16291"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16291"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16291"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16292"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16292"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16292"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16293"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16293"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16293"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16294"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16294"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16294"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16295"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16295"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16295"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16296"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16296"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16296"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16297"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16297"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16297"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16298"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16298"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16298"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16299"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16299"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16299"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16300"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16300"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16300"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16301"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16301"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16301"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16302"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16302"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16302"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16303"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16303"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16303"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16304"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16304"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16304"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16305"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16305"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16306"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16306"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16306"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16307"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16307"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16307"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16308"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16308"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16308"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16309"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16309"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16309"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-16310"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-16310"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16310"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-17538"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-17538"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-17538"}],"affected":[{"package":{"name":"ghostscript","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-gtk-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript-gtk-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-tools-dvipdf","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript-tools-dvipdf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-tools-fonts","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript-tools-fonts"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-tools-printing","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript-tools-printing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-x11","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript-x11"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-x11-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ghostscript-x11-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"libgs","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libgs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"libgs-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libgs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"libgs-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libgs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-debugsource","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-doc","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-gtk-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript-gtk-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-tools-dvipdf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript-tools-dvipdf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-tools-fonts","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript-tools-fonts"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-tools-printing","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript-tools-printing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-x11","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript-x11"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"ghostscript-x11-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/ghostscript-x11-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"libgs","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/libgs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"libgs-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/libgs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}},{"package":{"name":"libgs-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/libgs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.27-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1852.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}