Link | Resource |
---|---|
https://seclists.org/oss-sec/2018/q3/182 | Mailing List Patch |
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=971472c83a345a16dac9f90f91258bb22dd77f22 | Patch Vendor Advisory |
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1497d65039885a52b598b137dd8622bd4672f9be | Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4288 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3768-1/ | Third Party Advisory |
https://security.gentoo.org/glsa/201811-12 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1626193 |
Configuration 1
|
Published : 2018-09-06 02:29
Updated : 2019-10-09 09:15
NVD link : CVE-2018-16585
Mitre link : CVE-2018-16585
Improper Restriction of Operations within the Bounds of a Memory Buffer