cpe:/a:artifex:ghostscript:8_64 cpe:/a:artifex:ghostscript:9.00 cpe:/a:artifex:ghostscript:9.01 cpe:/a:artifex:ghostscript:9.02 cpe:/a:artifex:ghostscript:9.04 cpe:/a:artifex:ghostscript:9.05 cpe:/a:artifex:ghostscript:9.06 cpe:/a:artifex:ghostscript:9.07 cpe:/a:artifex:ghostscript:9.09 cpe:/a:artifex:ghostscript:9.10 cpe:/a:artifex:ghostscript:9.14 cpe:/a:artifex:ghostscript:9.15 cpe:/a:artifex:ghostscript:9.16 cpe:/a:artifex:ghostscript:9.18 cpe:/a:artifex:ghostscript:9.19 cpe:/a:artifex:ghostscript:9.20 cpe:/a:artifex:ghostscript:9.21 cpe:/a:artifex:ghostscript:9.22 cpe:/a:artifex:ghostscript:9.23 cpe:/a:artifex:ghostscript:9.24 cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~ cpe:/o:debian:debian_linux:8.0 cpe:/o:debian:debian_linux:9.0 cpe:/o:redhat:enterprise_linux_desktop:7.0 cpe:/o:redhat:enterprise_linux_server:7.0 cpe:/o:redhat:enterprise_linux_server_aus:7.6 cpe:/o:redhat:enterprise_linux_server_eus:7.6 cpe:/o:redhat:enterprise_linux_server_tus:7.6 cpe:/o:redhat:enterprise_linux_workstation:7.0 CVE-2018-16802 2018-09-10T12:29:00.950-04:00 2019-10-02T20:03:26.223-04:00 6.8 NETWORK MEDIUM NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2019-03-07T10:42:13.417-05:00 DEBIAN DSA-4294 GENTOO GLSA-201811-12 REDHAT RHSA-2018:3834 UBUNTU USN-3768-1 MLIST [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update MLIST [oss-security] 20180909 Re: Ghostscript 9.24 issues MISC http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b72e3965b7968bb1d96baa137cd063ac6 MISC http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24dbd002fb9c131313253c307cf3951b3d47 CONFIRM https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5812b1b78fc4d36fdc293b7859de69241140d590 MISC https://seclists.org/oss-sec/2018/q3/229 An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.