跳转到帖子

CentOS Linux: CVE-2023-43115: Important: ghostscript security update (Multiple Advisories)

recommended_posts

发布于
  • Members

CentOS Linux: CVE-2023-43115: Important: ghostscript security update (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
09/18/2023
Created
11/04/2023
Added
11/03/2023
Modified
01/28/2025

Description

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

Solution(s)

  • centos-upgrade-ghostscript
  • centos-upgrade-ghostscript-debuginfo
  • centos-upgrade-ghostscript-debugsource
  • centos-upgrade-ghostscript-doc
  • centos-upgrade-ghostscript-gtk-debuginfo
  • centos-upgrade-ghostscript-tools-dvipdf
  • centos-upgrade-ghostscript-tools-fonts
  • centos-upgrade-ghostscript-tools-printing
  • centos-upgrade-ghostscript-x11
  • centos-upgrade-ghostscript-x11-debuginfo
  • centos-upgrade-libgs
  • centos-upgrade-libgs-debuginfo

References

  • CVE-2023-43115
  • 查看数 708
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…