ALT-BU-2018-3469-1
Branch sisyphus update bulletin.
Package kernel-image-std-pae updated to version 4.4.156-alt1 for branch sisyphus in task 213116.
Closed vulnerabilities
BDU:2019-02508
Уязвимость функции irda_setsockopt ядра операционной системы Linux, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2021-01415
Уязвимость драйвера drivers/staging/irda/net/af_irda.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-6554
Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
- 105302
- 105302
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
Modified: 2024-11-21
CVE-2018-6555
The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.
- 105304
- 105304
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
Package kernel-image-std-def updated to version 4.14.70-alt1 for branch sisyphus in task 213109.
Closed vulnerabilities
BDU:2019-02508
Уязвимость функции irda_setsockopt ядра операционной системы Linux, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2021-01415
Уязвимость драйвера drivers/staging/irda/net/af_irda.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-6554
Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
- 105302
- 105302
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
Modified: 2024-11-21
CVE-2018-6555
The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.
- 105304
- 105304
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
Closed bugs
gnome-documents не запускается, требует установить tracker-miners
Closed bugs
Падает при импорте
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-17144
Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.
- https://bitcoincore.org/en/2018/09/18/release-0.16.3/
- https://bitcoincore.org/en/2018/09/18/release-0.16.3/
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17144
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17144
- https://github.com/bitcoin/bitcoin/blob/v0.16.3/doc/release-notes.md
- https://github.com/bitcoin/bitcoin/blob/v0.16.3/doc/release-notes.md
- https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md
- https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md
- https://github.com/JinBean/CVE-Extension
- https://github.com/JinBean/CVE-Extension
Package ghostscript updated to version 9.25-alt1 for branch sisyphus in task 213220.
Closed vulnerabilities
BDU:2018-01428
Уязвимость функции set_text_distance компонента pdfwrite набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-01519
Уязвимость компонента Sandbox Protection Mechanism набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защитный механизм песочницы и выполнить произвольный код
BDU:2019-00972
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками преобразования типов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01634
Уязвимость библиотеки zfile.c интерпретатора PostScript/PDF Ghostscript, связанная с раскрытием информации, позволяющая нарушителю определить наличие и размер произвольных файлов
BDU:2019-03986
Уязвимость функции fill_threshhold_buffer (base/gxht_thresh.c) набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-04348
Уязвимость компонентов gssetresolution и gsgetresolution набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-04351
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-04352
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2020-01870
Уязвимость реализации команды setdistillerkeys набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01871
Уязвимость встроенного конвертера PDF14 набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01872
Уязвимость компонента .tempfile набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защиту –dSAFER , удалить файлы или получить несанкционированный доступ к защищаемой информации
BDU:2021-05648
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с недостатками преобразования типов данных, позволяющая нарушителю выполнить произвольные команды и обойти защиту –dSAFER
Modified: 2024-11-21
CVE-2016-10217
The pdf14_open function in base/gdevp14.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file that is mishandled in the color management module.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=90fd0c7ca3efc1ddff64a86f4104b13b3ac969eb
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=90fd0c7ca3efc1ddff64a86f4104b13b3ac969eb
- https://bugs.ghostscript.com/show_bug.cgi?id=697456
- https://bugs.ghostscript.com/show_bug.cgi?id=697456
Modified: 2024-11-21
CVE-2016-10218
The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d621292fb2c8157d9899dcd83fd04dd250e30fe4
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d621292fb2c8157d9899dcd83fd04dd250e30fe4
- https://bugs.ghostscript.com/show_bug.cgi?id=697444
- https://bugs.ghostscript.com/show_bug.cgi?id=697444
Modified: 2024-11-21
CVE-2016-10219
The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.
- DSA-3838
- DSA-3838
- http://www.ghostscript.com/cgi-bin/findgit.cgi?4bef1a1d32e29b68855616020dbff574b9cda08f
- http://www.ghostscript.com/cgi-bin/findgit.cgi?4bef1a1d32e29b68855616020dbff574b9cda08f
- https://bugs.ghostscript.com/show_bug.cgi?id=697453
- https://bugs.ghostscript.com/show_bug.cgi?id=697453
- GLSA-201708-06
- GLSA-201708-06
Modified: 2024-11-21
CVE-2016-10220
The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module.
- DSA-3838
- DSA-3838
- http://www.ghostscript.com/cgi-bin/findgit.cgi?daf85701dab05f17e924a48a81edc9195b4a04e8
- http://www.ghostscript.com/cgi-bin/findgit.cgi?daf85701dab05f17e924a48a81edc9195b4a04e8
- https://bugs.ghostscript.com/show_bug.cgi?id=697450
- https://bugs.ghostscript.com/show_bug.cgi?id=697450
- GLSA-201708-06
- GLSA-201708-06
Modified: 2024-11-21
CVE-2016-10317
The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document.
Modified: 2024-11-21
CVE-2016-7976
The PS Interpreter in Ghostscript 9.18 and 9.20 allows remote attackers to execute arbitrary code via crafted userparams.
- http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git%3Ba=commit%3Bh=6d444c273da5499a4cd72f21cb6d4c9a5256807d
- http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git%3Ba=commit%3Bh=6d444c273da5499a4cd72f21cb6d4c9a5256807d
- DSA-3691
- DSA-3691
- [oss-security] 20161019 Re: Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161019 Re: Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- 95332
- 95332
- https://bugs.ghostscript.com/show_bug.cgi?id=697178
- https://bugs.ghostscript.com/show_bug.cgi?id=697178
- GLSA-201702-31
- GLSA-201702-31
Modified: 2024-11-21
CVE-2016-7977
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=8abd22010eb4db0fb1b10e430d5f5d83e015ef70
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=8abd22010eb4db0fb1b10e430d5f5d83e015ef70
- RHSA-2017:0013
- RHSA-2017:0013
- RHSA-2017:0014
- RHSA-2017:0014
- DSA-3691
- DSA-3691
- [oss-security] 20160928 Re: ImageMagick identify "d:" hangs
- [oss-security] 20160928 Re: ImageMagick identify "d:" hangs
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- 95334
- 95334
- https://bugs.ghostscript.com/show_bug.cgi?id=697169
- https://bugs.ghostscript.com/show_bug.cgi?id=697169
- https://ghostscript.com/doc/9.21/History9.htm
- https://ghostscript.com/doc/9.21/History9.htm
- GLSA-201702-31
- GLSA-201702-31
Modified: 2024-11-21
CVE-2016-7978
Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice.
- RHSA-2017:0013
- RHSA-2017:0013
- DSA-3691
- DSA-3691
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- 95336
- 95336
- https://bugs.ghostscript.com/show_bug.cgi?id=697179
- https://bugs.ghostscript.com/show_bug.cgi?id=697179
- GLSA-201702-31
- GLSA-201702-31
Modified: 2024-11-21
CVE-2016-7979
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=875a0095f37626a721c7ff57d606a0f95af03913
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=875a0095f37626a721c7ff57d606a0f95af03913
- RHSA-2017:0013
- RHSA-2017:0013
- RHSA-2017:0014
- RHSA-2017:0014
- DSA-3691
- DSA-3691
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- 95337
- 95337
- https://bugs.ghostscript.com/show_bug.cgi?id=697190
- https://bugs.ghostscript.com/show_bug.cgi?id=697190
- GLSA-201702-31
- GLSA-201702-31
Modified: 2024-11-21
CVE-2016-8602
The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=f5c7555c303
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=f5c7555c303
- RHSA-2017:0013
- RHSA-2017:0013
- RHSA-2017:0014
- RHSA-2017:0014
- DSA-3691
- DSA-3691
- [oss-security] 20161011 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161011 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161011 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161011 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- 95311
- 95311
- https://bugs.ghostscript.com/show_bug.cgi?id=697203
- https://bugs.ghostscript.com/show_bug.cgi?id=697203
- https://bugzilla.redhat.com/show_bug.cgi?id=1383940
- https://bugzilla.redhat.com/show_bug.cgi?id=1383940
- https://ghostscript.com/doc/9.21/History9.htm
- https://ghostscript.com/doc/9.21/History9.htm
- GLSA-201702-31
- GLSA-201702-31
Modified: 2024-11-21
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
- http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092
- http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092
- 97095
- 97095
- https://bugs.ghostscript.com/show_bug.cgi?id=697457
- https://bugs.ghostscript.com/show_bug.cgi?id=697457
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601
- GLSA-201706-24
- GLSA-201706-24
- DSA-3817
- DSA-3817
Modified: 2024-11-21
CVE-2017-5951
The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
Modified: 2024-11-21
CVE-2017-7207
The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document.
- DSA-3838
- DSA-3838
- http://www.ghostscript.com/cgi-bin/findgit.cgi?309eca4e0a31ea70dcc844812691439312dad091
- http://www.ghostscript.com/cgi-bin/findgit.cgi?309eca4e0a31ea70dcc844812691439312dad091
- 96995
- 96995
- 1039071
- 1039071
- RHSA-2017:2180
- RHSA-2017:2180
- https://bugs.ghostscript.com/show_bug.cgi?id=697676
- https://bugs.ghostscript.com/show_bug.cgi?id=697676
- GLSA-201708-06
- GLSA-201708-06
Modified: 2025-03-14
CVE-2017-8291
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
- http://openwall.com/lists/oss-security/2017/04/28/2
- DSA-3838
- 98476
- RHSA-2017:1230
- https://bugs.ghostscript.com/show_bug.cgi?id=697808
- https://bugzilla.redhat.com/show_bug.cgi?id=1446063
- https://bugzilla.suse.com/show_bug.cgi?id=1036453
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d
- GLSA-201708-06
- 41955
- http://openwall.com/lists/oss-security/2017/04/28/2
- 41955
- GLSA-201708-06
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d
- https://bugzilla.suse.com/show_bug.cgi?id=1036453
- https://bugzilla.redhat.com/show_bug.cgi?id=1446063
- https://bugs.ghostscript.com/show_bug.cgi?id=697808
- RHSA-2017:1230
- 98476
- DSA-3838
Modified: 2024-11-21
CVE-2018-10194
The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=39b1e54b2968620723bf32e96764c88797714879
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=39b1e54b2968620723bf32e96764c88797714879
- 1040729
- 1040729
- RHSA-2018:2918
- RHSA-2018:2918
- https://bugs.ghostscript.com/show_bug.cgi?id=699255
- https://bugs.ghostscript.com/show_bug.cgi?id=699255
- [debian-lts-announce] 20180425 [SECURITY] [DLA 1363-1] ghostscript security update
- [debian-lts-announce] 20180425 [SECURITY] [DLA 1363-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3636-1
- USN-3636-1
Modified: 2024-11-21
CVE-2018-11645
psi/zfile.c in Artifex Ghostscript before 9.21rc1 permits the status command even if -dSAFER is used, which might allow remote attackers to determine the existence and size of arbitrary files, a similar issue to CVE-2016-7977.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b60d50b7567369ad856cebe1efb6cd7dd2284219
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b60d50b7567369ad856cebe1efb6cd7dd2284219
- RHSA-2019:2281
- RHSA-2019:2281
- https://bugs.ghostscript.com/show_bug.cgi?id=697193
- https://bugs.ghostscript.com/show_bug.cgi?id=697193
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- USN-3768-1
- USN-3768-1
- DSA-4336
- DSA-4336
Modified: 2024-11-21
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0d3901189f245232f0161addf215d7268c4d05a3
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0d3901189f245232f0161addf215d7268c4d05a3
- RHSA-2018:3650
- RHSA-2018:3650
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
- https://www.kb.cert.org/vuls/id/332928
- https://www.kb.cert.org/vuls/id/332928
Modified: 2024-11-21
CVE-2018-16511
An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0edd3d6c634a577db261615a9dc2719bca7f6e01
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0edd3d6c634a577db261615a9dc2719bca7f6e01
- http://seclists.org/oss-sec/2018/q3/182
- http://seclists.org/oss-sec/2018/q3/182
- RHSA-2018:3650
- RHSA-2018:3650
- https://bugs.ghostscript.com/show_bug.cgi?id=699659
- https://bugs.ghostscript.com/show_bug.cgi?id=699659
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16539
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=a054156d425b4dbdaaa9fda4b5f1182b27598c2b
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=a054156d425b4dbdaaa9fda4b5f1182b27598c2b
- RHSA-2018:3650
- RHSA-2018:3650
- https://bugs.ghostscript.com/show_bug.cgi?id=699658
- https://bugs.ghostscript.com/show_bug.cgi?id=699658
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16540
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=c432131c3fdb2143e148e8ba88555f7f7a63b25e
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=c432131c3fdb2143e148e8ba88555f7f7a63b25e
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0229
- RHSA-2019:0229
- https://bugs.ghostscript.com/show_bug.cgi?id=699661
- https://bugs.ghostscript.com/show_bug.cgi?id=699661
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=699664
- https://bugs.ghostscript.com/show_bug.cgi?id=699664
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16542
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b575e1ec42cc86f6a58c603f2a88fcc2af699cc8
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b575e1ec42cc86f6a58c603f2a88fcc2af699cc8
- http://seclists.org/oss-sec/2018/q3/182
- http://seclists.org/oss-sec/2018/q3/182
- 105337
- 105337
- RHSA-2018:2918
- RHSA-2018:2918
- https://bugs.ghostscript.com/show_bug.cgi?id=699668
- https://bugs.ghostscript.com/show_bug.cgi?id=699668
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16543
In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5b5536fa88a9e885032bc0df3852c3439399a5c0
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5b5536fa88a9e885032bc0df3852c3439399a5c0
- https://bugs.ghostscript.com/show_bug.cgi?id=699670
- https://bugs.ghostscript.com/show_bug.cgi?id=699670
- [debian-lts-announce] 20180930 [SECURITY] [DLA 1527-1] ghostscript security update
- [debian-lts-announce] 20180930 [SECURITY] [DLA 1527-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16585
An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22
- https://bugzilla.redhat.com/show_bug.cgi?id=1626193
- https://bugzilla.redhat.com/show_bug.cgi?id=1626193
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- https://seclists.org/oss-sec/2018/q3/182
- https://seclists.org/oss-sec/2018/q3/182
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16802
An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3e5d316b72e3965b7968bb1d96baa137cd063ac6
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3e5d316b72e3965b7968bb1d96baa137cd063ac6
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=643b24dbd002fb9c131313253c307cf3951b3d47
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=643b24dbd002fb9c131313253c307cf3951b3d47
- RHSA-2018:3834
- RHSA-2018:3834
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=5812b1b78fc4d36fdc293b7859de69241140d590
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=5812b1b78fc4d36fdc293b7859de69241140d590
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [oss-security] 20180909 Re: Ghostscript 9.24 issues
- [oss-security] 20180909 Re: Ghostscript 9.24 issues
- https://seclists.org/oss-sec/2018/q3/229
- https://seclists.org/oss-sec/2018/q3/229
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4294
- DSA-4294
Modified: 2024-11-21
CVE-2018-17183
Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=fb713b3818b52d8a6cf62c951eba2e1795ff9624
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=fb713b3818b52d8a6cf62c951eba2e1795ff9624
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=699708
- https://bugs.ghostscript.com/show_bug.cgi?id=699708
- [debian-lts-announce] 20180930 [SECURITY] [DLA 1527-1] ghostscript security update
- [debian-lts-announce] 20180930 [SECURITY] [DLA 1527-1] ghostscript security update
- USN-3773-1
- USN-3773-1
Modified: 2024-11-21
CVE-2018-17961
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a54c9e61e7d0
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a54c9e61e7d0
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a5a9bf8c6a63
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a5a9bf8c6a63
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a6807394bd94
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a6807394bd94
- [oss-security] 20181009 ghostscript: bypassing executeonly to escape -dSAFER sandbox (CVE-2018-17961)
- [oss-security] 20181009 ghostscript: bypassing executeonly to escape -dSAFER sandbox (CVE-2018-17961)
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2
- https://bugs.ghostscript.com/show_bug.cgi?id=699816
- https://bugs.ghostscript.com/show_bug.cgi?id=699816
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- USN-3803-1
- USN-3803-1
- DSA-4336
- DSA-4336
- 45573
- 45573
Closed bugs
сборка 9.24-alt1 не работает
Closed vulnerabilities
BDU:2020-01729
Уязвимость плагина rustdoc языка программирования Rust, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-1000622
The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.
- openSUSE-SU-2019:2203
- openSUSE-SU-2019:2203
- openSUSE-SU-2019:2244
- openSUSE-SU-2019:2244
- openSUSE-SU-2019:2294
- openSUSE-SU-2019:2294
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM
- GLSA-201812-11
- GLSA-201812-11
Modified: 2024-11-21
CVE-2018-25008
In the standard library in Rust before 1.29.0, there is weak synchronization in the Arc::get_mut method. This synchronization issue can be lead to memory safety issues through race conditions.
Modified: 2024-11-21
CVE-2019-16760
Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. Usage of the `package` key to rename dependencies in `Cargo.toml` is ignored in Rust 1.25.0 and prior. When Rust 1.25.0 and prior is used Cargo may download the wrong dependency, which could be squatted on crates.io to be a malicious package. This not only affects manifests that you write locally yourself, but also manifests published to crates.io. Rust 1.0.0 through Rust 1.25.0 is affected by this advisory because Cargo will ignore the `package` key in manifests. Rust 1.26.0 through Rust 1.30.0 are not affected and typically will emit an error because the `package` key is unstable. Rust 1.31.0 and after are not affected because Cargo understands the `package` key. Users of the affected versions are strongly encouraged to update their compiler to the latest available one. Preventing this issue from happening requires updating your compiler to be either Rust 1.26.0 or newer. There will be no point release for Rust versions prior to 1.26.0. Users of Rust 1.19.0 to Rust 1.25.0 can instead apply linked patches to mitigate the issue.
- [oss-security] 20191008 CVE-2019-16760: Cargo prior to Rust 1.26.0 may download the wrong dependency
- [oss-security] 20191008 CVE-2019-16760: Cargo prior to Rust 1.26.0 may download the wrong dependency
- https://gist.github.com/pietroalbini/0d293b24a44babbeb6187e06eebd4992
- https://gist.github.com/pietroalbini/0d293b24a44babbeb6187e06eebd4992
- https://github.com/rust-lang/rust/security/advisories/GHSA-phjm-8x66-qw4r
- https://github.com/rust-lang/rust/security/advisories/GHSA-phjm-8x66-qw4r
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/rVQ5e3TDnpQ
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/rVQ5e3TDnpQ