[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2009:144 -- Mandriva ghostscript

ID: oval:org.secpod.oval:def:300452Date: (C)2012-01-07   (M)2023-12-26
Class: PATCHFamily: unix




Multiple security vulnerabilities has been identified and fixed in ghostscript: Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation . Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf . Previousely the ghostscript packages were statically built against a bundled and private copy of the jasper library. This update makes ghostscript link against the shared system jasper library which makes it easier to address presumptive future security issues in the jasper library.

Platform:
Mandriva Linux 2009.0
Mandriva Linux 2009.1
Mandriva Linux 2008.1
Product:
ghostscript
Reference:
MDVSA-2009:144
CVE-2008-3522
CVE-2008-3520
CVE    2
CVE-2008-3520
CVE-2008-3522
CPE    3
cpe:/o:mandriva:linux:2008.1
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2009.1

© SecPod Technologies