VYPR

rpm package

suse/ghostscript&distro=SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS

pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOS

Vulnerabilities (4)

  • CVE-2023-46751Dec 6, 2023
    affected < 9.52-150000.177.1fixed 9.52-150000.177.1

    An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.

  • CVE-2023-43115Sep 18, 2023
    affected < 9.52-150000.173.2fixed 9.52-150000.173.2

    In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJ

  • CVE-2023-36664Jun 25, 2023
    affected < 9.52-150000.167.1fixed 9.52-150000.167.1

    Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).

  • CVE-2023-28879Mar 31, 2023
    affected < 9.52-150000.164.1fixed 9.52-150000.164.1

    In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than fu