drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in GPL Ghostscript
Name: |
Mehrere Probleme in GPL Ghostscript |
|
ID: |
202004-03 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Mi, 1. April 2020, 22:55 |
|
Referenzen: |
https://nvd.nist.gov/vuln/detail/CVE-2019-14813
https://nvd.nist.gov/vuln/detail/CVE-2019-14811
https://nvd.nist.gov/vuln/detail/CVE-2019-14817
https://nvd.nist.gov/vuln/detail/CVE-2019-14812
https://nvd.nist.gov/vuln/detail/CVE-2019-3838
https://nvd.nist.gov/vuln/detail/CVE-2019-3835
https://nvd.nist.gov/vuln/detail/CVE-2019-6116
https://nvd.nist.gov/vuln/detail/CVE-2019-10216 |
|
Applikationen: |
Ghostscript |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --VAt6FooOlKmlo9YbV2YUVEpJG8TfNWHME Content-Type: multipart/mixed; boundary="5tR3SrYX9raH0OXoJI1adRvFzg3Fyubi1"
--5tR3SrYX9raH0OXoJI1adRvFzg3Fyubi1 Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202004-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal Title: GPL Ghostscript: Multiple vulnerabilities Date: April 01, 2020 Bugs: #676264, #692106, #693002 ID: 202004-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in the execution of arbitrary code.
Background ==========
Ghostscript is an interpreter for the PostScript language and for PDF.
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-text/ghostscript-gpl < 9.28_rc4 >= 9.28_rc4
Description ===========
Multiple vulnerabilities have been discovered in GPL Ghostscript. Please review the CVE identifiers referenced below for details.
Impact ======
A remote attacker could entice a user to process a specially crafted file using GPL Ghostscript, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All GPL Ghostscript users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=app-text/ghostscript-gpl-9.28_rc4"
References ==========
[ 1 ] CVE-2019-10216 https://nvd.nist.gov/vuln/detail/CVE-2019-10216 [ 2 ] CVE-2019-14811 https://nvd.nist.gov/vuln/detail/CVE-2019-14811 [ 3 ] CVE-2019-14812 https://nvd.nist.gov/vuln/detail/CVE-2019-14812 [ 4 ] CVE-2019-14813 https://nvd.nist.gov/vuln/detail/CVE-2019-14813 [ 5 ] CVE-2019-14817 https://nvd.nist.gov/vuln/detail/CVE-2019-14817 [ 6 ] CVE-2019-3835 https://nvd.nist.gov/vuln/detail/CVE-2019-3835 [ 7 ] CVE-2019-3838 https://nvd.nist.gov/vuln/detail/CVE-2019-3838 [ 8 ] CVE-2019-6116 https://nvd.nist.gov/vuln/detail/CVE-2019-6116
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202004-03
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License =======
Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
--5tR3SrYX9raH0OXoJI1adRvFzg3Fyubi1--
--VAt6FooOlKmlo9YbV2YUVEpJG8TfNWHME Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQGTBAEBCgB9FiEEExKRzo+LDXJgXHuURObr3Jv2BVkFAl6E8M1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDEz MTI5MUNFOEY4QjBENzI2MDVDN0I5NDQ0RTZFQkRDOUJGNjA1NTkACgkQRObr3Jv2 BVmDTQgAr38+HaWIRFba70mGo1xNu9R5+i1Ax93jXDqn+jOXc6WO+bHj7pdDJz25 NkB5yrJU62XkNxn2Sc7NObYYrnraSP6HCrN6QvqO0rJPVwLKr4hZ+B4GwziSPcAE GU20J3HKOCnqgruShBurAdIFwL2jaa9DWW/gAuX/SjuJmtsg3Wmd1DnH3p9GWx1k r7j5wtU72QGYtmofHHtacfPHhK7sTmKVaE/Nny9nhoEINhcuvNMxVhUjIzS5CJwT zbL8/6KGH+lYwXq9VnvZpeaYxTjErfFHjaF/30uqKkC0K/1fEvU2UVrhN3B4VLd3 1zTWDkkywcIIVR2eMSsqKZ3MpvsB2w== =zERx -----END PGP SIGNATURE-----
--VAt6FooOlKmlo9YbV2YUVEpJG8TfNWHME--
|
|
|
|