cvrf2cusa/cusa/g/ghostscript/ghostscript-9.55.0-6_openEuler-SA-2023-1984.json

14 lines
913 B
JSON
Raw Permalink Normal View History

{
"id": "openEuler-SA-2023-1984",
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1984",
"title": "An update for ghostscript is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS and openEuler-22.03-LTS-SP2",
"severity": "High",
"description": "Ghostscript is an interpreter for PostScript™ and Portable Document Format (PDF) files. Ghostscript consists of a PostScript interpreter layer, and a graphics library.\r\n\r\nSecurity Fix(es):\r\n\r\nAn issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.(CVE-2023-46751)",
"cves": [
{
"id": "CVE-2023-46751",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46751",
"severity": "High"
}
]
}