Hi,
On Mon, Aug 27, 2018 at 08:34:25PM +0200, Jonas Smedegaard wrote:
> Quoting Salvatore Bonaccorso (2018-08-26 21:55:14)
> > Hi,
> >
> > On Sun, Aug 26, 2018 at 06:08:58PM +0100, Nicolas Braud-Santoni wrote:
> > > Tavis Ormandy disclosed a new ghoscript security issue, leading directly
> > > t
Quoting Salvatore Bonaccorso (2018-08-26 21:55:14)
> Hi,
>
> On Sun, Aug 26, 2018 at 06:08:58PM +0100, Nicolas Braud-Santoni wrote:
> > Tavis Ormandy disclosed a new ghoscript security issue, leading directly to
> > code
> > execution: http://openwall.com/lists/oss-security/2018/08/21/2
>
> The
Hi,
On Sun, Aug 26, 2018 at 06:08:58PM +0100, Nicolas Braud-Santoni wrote:
> Tavis Ormandy disclosed a new ghoscript security issue, leading directly to
> code
> execution: http://openwall.com/lists/oss-security/2018/08/21/2
There are actually several issues, see the whole thread. For now since
On Sun, Aug 26, 2018 at 06:08:58PM +0100, Nicolas Braud-Santoni wrote:
>
> I'm attaching the relevant files.
Oops, forgot the attachments.
exploit.ps
Description: PostScript document
signature.asc
Description: PGP signature
Control: tag -1 stretch
> I was able to reproduce the issue on my system:
Reproduced on stretch too.
SR
--
Stefano Rivera
http://tumbleweed.org.za/
+1 415 683 3272
Package: ghostscript
Version: 9.22~dfsg-2.1
Severity: grave
Tags: security buster sid
Justification: user security hole
Hi,
Tavis Ormandy disclosed a new ghoscript security issue, leading directly to code
execution: http://openwall.com/lists/oss-security/2018/08/21/2
I don't think this is [CVE-
6 matches
Mail list logo