ghostscript-9.27-11.el8
エラータID: AXSA:2023-7184:07
リリース日:
2023/12/22 Friday - 22:41
題名:
ghostscript-9.27-11.el8
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- Ghostscript には、メモリ領域の範囲外書き込みの問題がある
ため、リモートの攻撃者により、特定の条件下でエスケープ文字
の書き込みを介して、PostScript インタプリタ内部のデータ破壊
を可能とする脆弱性が存在します。(CVE-2023-28879)
- Ghostscript の base/gdevdevn.c の devn_pcx_write_rle()
関数には、バッファオーバーフローの問題があるため、ローカルの
攻撃者により、DEVN デバイス用の細工された PDF ファイルの出力
を介して、サービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2023-38559)
- Ghostscript の contrib/japanese/gdev10v.c 内の
pcs_write_rle() 関数には、バッファーオーバーフローの問題
があるため、リモートの攻撃者により、巧妙に細工された PDF
ファイルを介して、サービス拒否攻撃を可能とする脆弱性が
存在します。(CVE-2023-4042)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2023-28879
In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
CVE-2023-38559
A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.
A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.
CVE-2023-4042
A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.
A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.
追加情報:
N/A
ダウンロード:
SRPMS
- ghostscript-9.27-11.el8.src.rpm
MD5: 5f8adb5495412f085eb37017a58a053e
SHA-256: 1f52751073a0a4d8595f154c5b41ac25b8ca9b0e492a8663706b50cf5f2df7b3
Size: 31.75 MB
Asianux Server 8 for x86_64
- ghostscript-9.27-11.el8.x86_64.rpm
MD5: 8389b0e0ceeb071c1f3770a5737a9993
SHA-256: 5ef9a3f1b95664447c9efebcfc56eb64391f6b40b293b7cf11f929fdd4a9c555
Size: 82.39 kB - ghostscript-doc-9.27-11.el8.noarch.rpm
MD5: 0ef87bf242cad063e54ccadcc006cecd
SHA-256: abadf57f5f875e625086ea70083e01762e58c214d6678debec32965e5a409ac3
Size: 3.60 MB - ghostscript-tools-dvipdf-9.27-11.el8.x86_64.rpm
MD5: 2873a827b673d9785d4c1b371b889a9e
SHA-256: c44f935d7ff8c8415168b63abf57d544e5cc780217d9d145a8e461edcf897156
Size: 55.66 kB - ghostscript-tools-fonts-9.27-11.el8.x86_64.rpm
MD5: d154dc57be747a1382f6aac7adc88499
SHA-256: 0a56a84f8550479c982040c11274c23881cb912a89487cb8fc42ecbcb934d8ba
Size: 56.64 kB - ghostscript-tools-printing-9.27-11.el8.x86_64.rpm
MD5: b5df21df99a1b574fb70021c00fb31aa
SHA-256: 2958c1b6c004f39a64fb426c32985d6eafb282ab8d2e82e41a34aa9298a0c9b5
Size: 56.63 kB - ghostscript-x11-9.27-11.el8.x86_64.rpm
MD5: 078aa986a99dc80ab87096b10833c49d
SHA-256: 242dbd3f7389ce11b0fbde565a1aa8791f0e9cf609f5eea13d8af9d0d2fdc84b
Size: 81.93 kB - libgs-9.27-11.el8.i686.rpm
MD5: ac6303906841c37e8a747a3ecb5a3079
SHA-256: f111b4e6acedb935dbbd53c5ae118b56ccd38a8ca5bdb9edb4e0a8aec0979191
Size: 3.22 MB - libgs-9.27-11.el8.x86_64.rpm
MD5: 7f4de21297bd879f07194e71daec61f2
SHA-256: a437e764217124ccb5b6ed2e6d80a64aa3c4c0c7ddf266bb81857f65d4163a3c
Size: 3.06 MB - libgs-devel-9.27-11.el8.i686.rpm
MD5: a602c67e5b7cff82510dd33c8b5ddd3d
SHA-256: c12e73bb0904f36fdbda4821912dcc86e52896981d59fa2049a20b0838d72aed
Size: 62.71 kB - libgs-devel-9.27-11.el8.x86_64.rpm
MD5: 6216a6ab4091d21ce07ff90a7162c524
SHA-256: 87e6f0a1add47afde158aea15b5027bd4fa14888b9b48c29bf0851be9f96e949
Size: 62.70 kB