跳转到帖子

CentOS Linux: CVE-2023-28879: Moderate: ghostscript security and bug fix update (Multiple Advisories)

recommended_posts

发布于
  • Members

CentOS Linux: CVE-2023-28879: Moderate: ghostscript security and bug fix update (Multiple Advisories)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
03/31/2023
Created
11/09/2023
Added
11/08/2023
Modified
01/28/2025

Description

In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.

Solution(s)

  • centos-upgrade-ghostscript
  • centos-upgrade-ghostscript-debuginfo
  • centos-upgrade-ghostscript-debugsource
  • centos-upgrade-ghostscript-doc
  • centos-upgrade-ghostscript-gtk-debuginfo
  • centos-upgrade-ghostscript-tools-dvipdf
  • centos-upgrade-ghostscript-tools-fonts
  • centos-upgrade-ghostscript-tools-printing
  • centos-upgrade-ghostscript-x11
  • centos-upgrade-ghostscript-x11-debuginfo
  • centos-upgrade-libgs
  • centos-upgrade-libgs-debuginfo

References

  • DSA-5383
  • CVE-2023-28879
  • 查看数 701
  • 已创建
  • 最后回复