ghostscript is vulnerable to authorization bypass. An attacker is able to bypass .tempfile
restrictions to write files onto the system using malicious PostScript files.
CPE | Name | Operator | Version |
---|---|---|---|
ghostscript | eq | 9.07__28.el7_4.2 | |
ghostscript | eq | 9.07__29.el7_5.2 | |
ghostscript | eq | 9.07__20.el7_3.1 |
git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
access.redhat.com/errata/RHSA-2018:3650
access.redhat.com/security/updates/classification/#important
lists.debian.org/debian-lts-announce/2018/09/msg00015.html
security.gentoo.org/glsa/201811-12
usn.ubuntu.com/3768-1/
www.debian.org/security/2018/dsa-4288
www.kb.cert.org/vuls/id/332928