摘要:
ghostscript security update
安全等级: Medium
公告ID: KylinSec-SA-2024-4025
发布日期: 2024年9月20日
关联CVE: CVE-2024-29508 CVE-2024-29510
Ghostscript is an interpreter for PostScriptâ„¢ and Portable Document Format (PDF) files. Ghostscript consists of a PostScript interpreter layer, and a graphics library.
Security Fix(es):
Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdf_base_font_alloc.(CVE-2024-29508)
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.(CVE-2024-29510)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-29508 | KY3.4-5A | ghostscript | Fixed |
CVE-2024-29510 | KY3.4-5A | ghostscript | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
ghostscript-help | noarch | 9.52-16.kb1.ky3_4 |
ghostscript | x86_64 | 9.52-16.kb1.ky3_4 |
ghostscript-devel | x86_64 | 9.52-16.kb1.ky3_4 |
ghostscript-tools-dvipdf | x86_64 | 9.52-16.kb1.ky3_4 |
ghostscript | aarch64 | 9.52-16.kb1.ky3_4 |
ghostscript-devel | aarch64 | 9.52-16.kb1.ky3_4 |
ghostscript-tools-dvipdf | aarch64 | 9.52-16.kb1.ky3_4 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名