Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-0014

Опубликовано: 04 янв. 2017
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2017-0014: ghostscript security update (MODERATE)

[8.70-21_1]

  • Added security fixes for:
    • CVE-2013-5653 (bug #1380327)
    • CVE-2016-7977 (bug #1380415)
    • CVE-2016-7979 (bug #1382305)
    • CVE-2016-8602 (bug #1383940)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

ghostscript

8.70-21.el6_8.1

ghostscript-devel

8.70-21.el6_8.1

ghostscript-doc

8.70-21.el6_8.1

ghostscript-gtk

8.70-21.el6_8.1

Oracle Linux i686

ghostscript

8.70-21.el6_8.1

ghostscript-devel

8.70-21.el6_8.1

ghostscript-doc

8.70-21.el6_8.1

ghostscript-gtk

8.70-21.el6_8.1

Oracle Linux sparc64

ghostscript

8.70-21.el6_8.1

ghostscript-devel

8.70-21.el6_8.1

ghostscript-doc

8.70-21.el6_8.1

ghostscript-gtk

8.70-21.el6_8.1

Связанные уязвимости

oracle-oval
почти 9 лет назад

ELSA-2017-0013: ghostscript security update (MODERATE)

suse-cvrf
около 9 лет назад

Security update for ghostscript-library

CVSS3: 5.5
ubuntu
больше 8 лет назад

Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.

CVSS3: 6.2
redhat
около 9 лет назад

Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.

CVSS3: 5.5
nvd
больше 8 лет назад

Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.