ALT-PU-2018-2511-1
Package ghostscript updated to version 9.25-alt0.M80C.2 for branch c8.1 in task 213400.
Closed vulnerabilities
BDU:2018-01428
Уязвимость функции set_text_distance компонента pdfwrite набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-01519
Уязвимость компонента Sandbox Protection Mechanism набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защитный механизм песочницы и выполнить произвольный код
BDU:2019-00972
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками преобразования типов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01634
Уязвимость библиотеки zfile.c интерпретатора PostScript/PDF Ghostscript, связанная с раскрытием информации, позволяющая нарушителю определить наличие и размер произвольных файлов
BDU:2019-04348
Уязвимость компонентов gssetresolution и gsgetresolution набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-04351
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-04352
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2020-01870
Уязвимость реализации команды setdistillerkeys набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01871
Уязвимость встроенного конвертера PDF14 набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01872
Уязвимость компонента .tempfile набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защиту –dSAFER , удалить файлы или получить несанкционированный доступ к защищаемой информации
BDU:2021-05648
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с недостатками преобразования типов данных, позволяющая нарушителю выполнить произвольные команды и обойти защиту –dSAFER
Modified: 2024-11-21
CVE-2016-7977
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=8abd22010eb4db0fb1b10e430d5f5d83e015ef70
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=8abd22010eb4db0fb1b10e430d5f5d83e015ef70
- RHSA-2017:0013
- RHSA-2017:0013
- RHSA-2017:0014
- RHSA-2017:0014
- DSA-3691
- DSA-3691
- [oss-security] 20160928 Re: ImageMagick identify "d:" hangs
- [oss-security] 20160928 Re: ImageMagick identify "d:" hangs
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- 95334
- 95334
- https://bugs.ghostscript.com/show_bug.cgi?id=697169
- https://bugs.ghostscript.com/show_bug.cgi?id=697169
- https://ghostscript.com/doc/9.21/History9.htm
- https://ghostscript.com/doc/9.21/History9.htm
- GLSA-201702-31
- GLSA-201702-31
Modified: 2024-11-21
CVE-2016-7979
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=875a0095f37626a721c7ff57d606a0f95af03913
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=875a0095f37626a721c7ff57d606a0f95af03913
- RHSA-2017:0013
- RHSA-2017:0013
- RHSA-2017:0014
- RHSA-2017:0014
- DSA-3691
- DSA-3691
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- 95337
- 95337
- https://bugs.ghostscript.com/show_bug.cgi?id=697190
- https://bugs.ghostscript.com/show_bug.cgi?id=697190
- GLSA-201702-31
- GLSA-201702-31
Modified: 2024-11-21
CVE-2016-8602
The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=f5c7555c303
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=f5c7555c303
- RHSA-2017:0013
- RHSA-2017:0013
- RHSA-2017:0014
- RHSA-2017:0014
- DSA-3691
- DSA-3691
- [oss-security] 20161011 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161011 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161011 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- [oss-security] 20161011 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems
- 95311
- 95311
- https://bugs.ghostscript.com/show_bug.cgi?id=697203
- https://bugs.ghostscript.com/show_bug.cgi?id=697203
- https://bugzilla.redhat.com/show_bug.cgi?id=1383940
- https://bugzilla.redhat.com/show_bug.cgi?id=1383940
- https://ghostscript.com/doc/9.21/History9.htm
- https://ghostscript.com/doc/9.21/History9.htm
- GLSA-201702-31
- GLSA-201702-31
Modified: 2024-11-21
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
- http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092
- http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092
- 97095
- 97095
- https://bugs.ghostscript.com/show_bug.cgi?id=697457
- https://bugs.ghostscript.com/show_bug.cgi?id=697457
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601
- GLSA-201706-24
- GLSA-201706-24
- DSA-3817
- DSA-3817
Modified: 2025-03-14
CVE-2017-8291
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
- http://openwall.com/lists/oss-security/2017/04/28/2
- DSA-3838
- 98476
- RHSA-2017:1230
- https://bugs.ghostscript.com/show_bug.cgi?id=697808
- https://bugzilla.redhat.com/show_bug.cgi?id=1446063
- https://bugzilla.suse.com/show_bug.cgi?id=1036453
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d
- GLSA-201708-06
- 41955
- http://openwall.com/lists/oss-security/2017/04/28/2
- 41955
- GLSA-201708-06
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d
- https://bugzilla.suse.com/show_bug.cgi?id=1036453
- https://bugzilla.redhat.com/show_bug.cgi?id=1446063
- https://bugs.ghostscript.com/show_bug.cgi?id=697808
- RHSA-2017:1230
- 98476
- DSA-3838
Modified: 2024-11-21
CVE-2018-10194
The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=39b1e54b2968620723bf32e96764c88797714879
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=39b1e54b2968620723bf32e96764c88797714879
- 1040729
- 1040729
- RHSA-2018:2918
- RHSA-2018:2918
- https://bugs.ghostscript.com/show_bug.cgi?id=699255
- https://bugs.ghostscript.com/show_bug.cgi?id=699255
- [debian-lts-announce] 20180425 [SECURITY] [DLA 1363-1] ghostscript security update
- [debian-lts-announce] 20180425 [SECURITY] [DLA 1363-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3636-1
- USN-3636-1
Modified: 2024-11-21
CVE-2018-11645
psi/zfile.c in Artifex Ghostscript before 9.21rc1 permits the status command even if -dSAFER is used, which might allow remote attackers to determine the existence and size of arbitrary files, a similar issue to CVE-2016-7977.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b60d50b7567369ad856cebe1efb6cd7dd2284219
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b60d50b7567369ad856cebe1efb6cd7dd2284219
- RHSA-2019:2281
- RHSA-2019:2281
- https://bugs.ghostscript.com/show_bug.cgi?id=697193
- https://bugs.ghostscript.com/show_bug.cgi?id=697193
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- USN-3768-1
- USN-3768-1
- DSA-4336
- DSA-4336
Modified: 2024-11-21
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0d3901189f245232f0161addf215d7268c4d05a3
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0d3901189f245232f0161addf215d7268c4d05a3
- RHSA-2018:3650
- RHSA-2018:3650
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
- https://www.kb.cert.org/vuls/id/332928
- https://www.kb.cert.org/vuls/id/332928
Modified: 2024-11-21
CVE-2018-16511
An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0edd3d6c634a577db261615a9dc2719bca7f6e01
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0edd3d6c634a577db261615a9dc2719bca7f6e01
- http://seclists.org/oss-sec/2018/q3/182
- http://seclists.org/oss-sec/2018/q3/182
- RHSA-2018:3650
- RHSA-2018:3650
- https://bugs.ghostscript.com/show_bug.cgi?id=699659
- https://bugs.ghostscript.com/show_bug.cgi?id=699659
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16539
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=a054156d425b4dbdaaa9fda4b5f1182b27598c2b
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=a054156d425b4dbdaaa9fda4b5f1182b27598c2b
- RHSA-2018:3650
- RHSA-2018:3650
- https://bugs.ghostscript.com/show_bug.cgi?id=699658
- https://bugs.ghostscript.com/show_bug.cgi?id=699658
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16540
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=c432131c3fdb2143e148e8ba88555f7f7a63b25e
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=c432131c3fdb2143e148e8ba88555f7f7a63b25e
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0229
- RHSA-2019:0229
- https://bugs.ghostscript.com/show_bug.cgi?id=699661
- https://bugs.ghostscript.com/show_bug.cgi?id=699661
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=699664
- https://bugs.ghostscript.com/show_bug.cgi?id=699664
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16542
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b575e1ec42cc86f6a58c603f2a88fcc2af699cc8
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b575e1ec42cc86f6a58c603f2a88fcc2af699cc8
- http://seclists.org/oss-sec/2018/q3/182
- http://seclists.org/oss-sec/2018/q3/182
- 105337
- 105337
- RHSA-2018:2918
- RHSA-2018:2918
- https://bugs.ghostscript.com/show_bug.cgi?id=699668
- https://bugs.ghostscript.com/show_bug.cgi?id=699668
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16543
In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5b5536fa88a9e885032bc0df3852c3439399a5c0
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5b5536fa88a9e885032bc0df3852c3439399a5c0
- https://bugs.ghostscript.com/show_bug.cgi?id=699670
- https://bugs.ghostscript.com/show_bug.cgi?id=699670
- [debian-lts-announce] 20180930 [SECURITY] [DLA 1527-1] ghostscript security update
- [debian-lts-announce] 20180930 [SECURITY] [DLA 1527-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16585
An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22
- https://bugzilla.redhat.com/show_bug.cgi?id=1626193
- https://bugzilla.redhat.com/show_bug.cgi?id=1626193
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- https://seclists.org/oss-sec/2018/q3/182
- https://seclists.org/oss-sec/2018/q3/182
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-16802
An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3e5d316b72e3965b7968bb1d96baa137cd063ac6
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3e5d316b72e3965b7968bb1d96baa137cd063ac6
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=643b24dbd002fb9c131313253c307cf3951b3d47
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=643b24dbd002fb9c131313253c307cf3951b3d47
- RHSA-2018:3834
- RHSA-2018:3834
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=5812b1b78fc4d36fdc293b7859de69241140d590
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=5812b1b78fc4d36fdc293b7859de69241140d590
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [oss-security] 20180909 Re: Ghostscript 9.24 issues
- [oss-security] 20180909 Re: Ghostscript 9.24 issues
- https://seclists.org/oss-sec/2018/q3/229
- https://seclists.org/oss-sec/2018/q3/229
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- DSA-4294
- DSA-4294
Modified: 2024-11-21
CVE-2018-17183
Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=fb713b3818b52d8a6cf62c951eba2e1795ff9624
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=fb713b3818b52d8a6cf62c951eba2e1795ff9624
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=699708
- https://bugs.ghostscript.com/show_bug.cgi?id=699708
- [debian-lts-announce] 20180930 [SECURITY] [DLA 1527-1] ghostscript security update
- [debian-lts-announce] 20180930 [SECURITY] [DLA 1527-1] ghostscript security update
- USN-3773-1
- USN-3773-1
Modified: 2024-11-21
CVE-2018-17961
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a54c9e61e7d0
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a54c9e61e7d0
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a5a9bf8c6a63
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a5a9bf8c6a63
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a6807394bd94
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=a6807394bd94
- [oss-security] 20181009 ghostscript: bypassing executeonly to escape -dSAFER sandbox (CVE-2018-17961)
- [oss-security] 20181009 ghostscript: bypassing executeonly to escape -dSAFER sandbox (CVE-2018-17961)
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2
- https://bugs.ghostscript.com/show_bug.cgi?id=699816
- https://bugs.ghostscript.com/show_bug.cgi?id=699816
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- USN-3803-1
- USN-3803-1
- DSA-4336
- DSA-4336
- 45573
- 45573
Closed bugs
Слинкован с libpng12 и libpng15 одновременно
сборка 9.24-alt1 не работает