Описание
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 9.25~dfsg+1-0ubuntu0.18.04.2 |
| cosmic | released | 9.25~dfsg+1-0ubuntu1.1 |
| devel | released | 9.25~dfsg+1-0ubuntu1.1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [9.25~dfsg+1-0ubuntu0.14.04.2]] |
| esm-infra/bionic | released | 9.25~dfsg+1-0ubuntu0.18.04.2 |
| esm-infra/xenial | released | 9.25~dfsg+1-0ubuntu0.16.04.2 |
| precise/esm | DNE | |
| trusty | released | 9.25~dfsg+1-0ubuntu0.14.04.2 |
| trusty/esm | DNE | trusty was released [9.25~dfsg+1-0ubuntu0.14.04.2] |
| upstream | needs-triage |
Показывать по
4.3 Medium
CVSS2
6.3 Medium
CVSS3
Связанные уязвимости
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
Artifex Ghostscript allows attackers to bypass a sandbox protection me ...
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
Уязвимость компонента Sandbox Protection Mechanism набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защитный механизм изолированной программной среды и раскрыть защищаемую информацию
4.3 Medium
CVSS2
6.3 Medium
CVSS3