MGASA-2019-0188

Source
https://advisories.mageia.org/MGASA-2019-0188.html
Import Source
https://advisories.mageia.org/MGASA-2019-0188.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0188
Related
Published
2019-06-10T19:17:03Z
Modified
2019-06-10T18:39:15Z
Summary
Updated ghostscript packages fix security vulnerability
Details

It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.28 are vulnerable. (CVE-2019-3839)

References
Credits

Affected packages

Mageia:6 / ghostscript

Package

Name
ghostscript
Purl
pkg:rpm/mageia/ghostscript?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.26-1.4.mga6

Ecosystem specific

{
    "section": "core"
}