ALT-PU-2018-2821-1
Package ghostscript updated to version 9.26-alt1 for branch c8.1 in task 217463.
Closed vulnerabilities
BDU:2018-01085
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, вызванная использованием неинициализированной памяти, позволяющая нарушителю выполнить произвольный код
BDU:2018-01086
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01087
Уязвимость интерпретатора набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код
BDU:2018-01518
Уязвимость компонента Sandbox Protection Mechanism набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защитный механизм изолированной программной среды и раскрыть защищаемую информацию
BDU:2018-01539
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками реализации проверки безопасности для стандартных элементов, позволяющая нарушителю обойти ограничения безопасности
BDU:2019-00422
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с некорректной проверкой «восстановления привилегий» во время обработки исключений типа /invalidaccess, позволяющая нарушителю выполнить произвольный код
BDU:2019-00858
Уязвимость процедуры 1Policy (обертка процедуры .forceput) набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с возможностью обхода среды для безопасного выполнения, позволяющая нарушителю выполнить произвольный код
BDU:2019-00875
Уязвимость в коде «psi/zdevice2.c» набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с отсутствием проверки свободного места на стеке, позволяющая нарушителю обойти установленный контроль доступа
BDU:2019-00876
Уязвимость в коде «psi/zdevice2.c» набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками типа setcolorspace, позволяющая нарушителю обойти установленный контроль доступа
BDU:2019-00877
Уязвимость в коде «psi/zdevice2.c» набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками типа JBIG2Decode, позволяющая нарушителю обойти установленный контроль доступа
BDU:2019-00973
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с неправильным преобразованием типов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-00976
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2018-15909
In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0b6cd1918e1ec4ffd087400a754a845180a4522b
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0b6cd1918e1ec4ffd087400a754a845180a4522b
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=e01e77a36cbb2e0277bc3a63852244bec41be0f6
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=e01e77a36cbb2e0277bc3a63852244bec41be0f6
- 105178
- 105178
- RHSA-2018:3650
- RHSA-2018:3650
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K24803507?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K24803507?utm_source=f5support&%3Butm_medium=RSS
- USN-3768-1
- USN-3768-1
- https://www.kb.cert.org/vuls/id/332928
- https://www.kb.cert.org/vuls/id/332928
Modified: 2024-11-21
CVE-2018-15910
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=c3476dde7743761a4e1d39a631716199b696b880
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=c3476dde7743761a4e1d39a631716199b696b880
- 105122
- 105122
- RHSA-2018:2918
- RHSA-2018:2918
- https://bugs.ghostscript.com/show_bug.cgi?id=699656
- https://bugs.ghostscript.com/show_bug.cgi?id=699656
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
- https://www.kb.cert.org/vuls/id/332928
- https://www.kb.cert.org/vuls/id/332928
Modified: 2024-11-21
CVE-2018-15911
In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8e9ce5016db968b40e4ec255a3005f2786cce45f
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8e9ce5016db968b40e4ec255a3005f2786cce45f
- 105122
- 105122
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=699665
- https://bugs.ghostscript.com/show_bug.cgi?id=699665
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
- https://www.kb.cert.org/vuls/id/332928
- https://www.kb.cert.org/vuls/id/332928
Modified: 2024-11-21
CVE-2018-16509
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5516c614dc33662a2afdc377159f70218e67bde5
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5516c614dc33662a2afdc377159f70218e67bde5
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=78911a01b67d590b4a91afac2e8417360b934156
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=78911a01b67d590b4a91afac2e8417360b934156
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=79cccf641486a6595c43f1de1cd7ade696020a31
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=79cccf641486a6595c43f1de1cd7ade696020a31
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=520bb0ea7519aa3e79db78aaf0589dae02103764
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=520bb0ea7519aa3e79db78aaf0589dae02103764
- http://seclists.org/oss-sec/2018/q3/142
- http://seclists.org/oss-sec/2018/q3/142
- 105122
- 105122
- RHSA-2018:2918
- RHSA-2018:2918
- RHSA-2018:3760
- RHSA-2018:3760
- https://bugs.ghostscript.com/show_bug.cgi?id=699654
- https://bugs.ghostscript.com/show_bug.cgi?id=699654
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4294
- DSA-4294
- 45369
- 45369
Modified: 2024-11-21
CVE-2018-16510
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=ea735ba37dc0fd5f5622d031830b9a559dec1cc9
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=ea735ba37dc0fd5f5622d031830b9a559dec1cc9
- http://openwall.com/lists/oss-security/2018/08/27/4
- http://openwall.com/lists/oss-security/2018/08/27/4
- https://bugs.ghostscript.com/show_bug.cgi?id=699671
- https://bugs.ghostscript.com/show_bug.cgi?id=699671
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- USN-3773-1
- USN-3773-1
Modified: 2024-11-21
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b326a71659b7837d3acde954b18bda1a6f5e9498
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b326a71659b7837d3acde954b18bda1a6f5e9498
- https://bugs.ghostscript.com/show_bug.cgi?id=699655
- https://bugs.ghostscript.com/show_bug.cgi?id=699655
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-18073
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=34cc326eb2c5695833361887fe0b32e8d987741c
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=34cc326eb2c5695833361887fe0b32e8d987741c
- http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html
- http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html
- [oss-security] 20181010 ghostscript: saved execution stacks can leak operator arrays (CVE-2018-18073)
- [oss-security] 20181010 ghostscript: saved execution stacks can leak operator arrays (CVE-2018-18073)
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1690
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1690
- https://bugs.ghostscript.com/show_bug.cgi?id=699927
- https://bugs.ghostscript.com/show_bug.cgi?id=699927
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- USN-3803-1
- USN-3803-1
- DSA-4336
- DSA-4336
Modified: 2024-11-21
CVE-2018-18284
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8d19fdf63f91f50466b08f23e2d93d37a4c5ea0b
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8d19fdf63f91f50466b08f23e2d93d37a4c5ea0b
- [oss-security] 20181016 ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284
- [oss-security] 20181016 ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284
- 107451
- 107451
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1696
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1696
- https://bugs.ghostscript.com/show_bug.cgi?id=699963
- https://bugs.ghostscript.com/show_bug.cgi?id=699963
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- USN-3803-1
- USN-3803-1
- DSA-4336
- DSA-4336
Modified: 2024-11-21
CVE-2018-19134
In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf
- 106278
- 106278
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=700141
- https://bugs.ghostscript.com/show_bug.cgi?id=700141
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1620-1] ghostscript security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1620-1] ghostscript security update
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://www.ghostscript.com/doc/9.26/News.htm
- https://www.ghostscript.com/doc/9.26/News.htm
Modified: 2024-11-21
CVE-2018-19409
An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
- 105990
- 105990
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=700176
- https://bugs.ghostscript.com/show_bug.cgi?id=700176
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=661e8d8fb8248c38d67958beda32f3a5876d0c3f
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=661e8d8fb8248c38d67958beda32f3a5876d0c3f
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3831-1
- USN-3831-1
- DSA-4346
- DSA-4346
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
Modified: 2024-11-21
CVE-2018-19475
psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3005fcb9bb160af199e761e03bc70a9f249a987e
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3005fcb9bb160af199e761e03bc70a9f249a987e
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=aeea342904978c9fe17d85f4906a0f6fcce2d315
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=aeea342904978c9fe17d85f4906a0f6fcce2d315
- 106154
- 106154
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0229
- RHSA-2019:0229
- https://bugs.ghostscript.com/show_bug.cgi?id=700153
- https://bugs.ghostscript.com/show_bug.cgi?id=700153
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- USN-3831-1
- USN-3831-1
- DSA-4346
- DSA-4346
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
Modified: 2024-11-21
CVE-2018-19476
psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a setcolorspace type confusion.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=67d760ab775dae4efe803b5944b0439aa3c0b04a
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=67d760ab775dae4efe803b5944b0439aa3c0b04a
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=434753adbe8be5534bfb9b7d91746023e8073d16
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=434753adbe8be5534bfb9b7d91746023e8073d16
- 106154
- 106154
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0229
- RHSA-2019:0229
- https://bugs.ghostscript.com/show_bug.cgi?id=700169
- https://bugs.ghostscript.com/show_bug.cgi?id=700169
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- USN-3831-1
- USN-3831-1
- DSA-4346
- DSA-4346
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
Modified: 2024-11-21
CVE-2018-19477
psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=ef252e7dc214bcbd9a2539216aab9202848602bb
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=ef252e7dc214bcbd9a2539216aab9202848602bb
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=606a22e77e7f081781e99e44644cd0119f559e03
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=606a22e77e7f081781e99e44644cd0119f559e03
- 106154
- 106154
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0229
- RHSA-2019:0229
- https://bugs.ghostscript.com/show_bug.cgi?id=700168
- https://bugs.ghostscript.com/show_bug.cgi?id=700168
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- USN-3831-1
- USN-3831-1
- DSA-4346
- DSA-4346
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
Modified: 2024-11-21
CVE-2018-19478
In Artifex Ghostscript before 9.26, a carefully crafted PDF file can trigger an extremely long running computation when parsing the file.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace
- 106445
- 106445
- https://bugs.ghostscript.com/show_bug.cgi?id=699856
- https://bugs.ghostscript.com/show_bug.cgi?id=699856
- https://bugzilla.redhat.com/show_bug.cgi?id=1655607
- https://bugzilla.redhat.com/show_bug.cgi?id=1655607
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1620-1] ghostscript security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1620-1] ghostscript security update
- https://www.ghostscript.com/doc/9.26/History9.htm
- https://www.ghostscript.com/doc/9.26/History9.htm
Modified: 2024-11-21
CVE-2020-14373
A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.
- https://bugs.ghostscript.com/show_bug.cgi?id=702851
- https://bugs.ghostscript.com/show_bug.cgi?id=702851
- https://bugzilla.redhat.com/show_bug.cgi?id=1873239
- https://bugzilla.redhat.com/show_bug.cgi?id=1873239
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=ece5cbbd9979cd35737b00e68267762d72feb2ea%3Bhp=1ef5f08f2c2e27efa978f0010669ff22355c385f
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=ece5cbbd9979cd35737b00e68267762d72feb2ea%3Bhp=1ef5f08f2c2e27efa978f0010669ff22355c385f