Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-16541 (GCVE-0-2018-16541)
Vulnerability from cvelistv5
Published
2018-09-05 18:00
Modified
2024-08-05 10:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:24:32.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d" }, { "name": "GLSA-201811-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-12" }, { "name": "USN-3768-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3768-1/" }, { "name": "RHSA-2018:3834", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.artifex.com/news/ghostscript-security-resolved/" }, { "name": "DSA-4288", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4288" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699664" }, { "name": "[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-18T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d" }, { "name": "GLSA-201811-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-12" }, { "name": "USN-3768-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3768-1/" }, { "name": "RHSA-2018:3834", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.artifex.com/news/ghostscript-security-resolved/" }, { "name": "DSA-4288", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4288" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699664" }, { "name": "[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16541", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d", "refsource": "MISC", "url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d" }, { "name": "GLSA-201811-12", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-12" }, { "name": "USN-3768-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3768-1/" }, { "name": "RHSA-2018:3834", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "name": "https://www.artifex.com/news/ghostscript-security-resolved/", "refsource": "MISC", "url": "https://www.artifex.com/news/ghostscript-security-resolved/" }, { "name": "DSA-4288", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4288" }, { "name": "https://bugs.ghostscript.com/show_bug.cgi?id=699664", "refsource": "MISC", "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699664" }, { "name": "[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16541", "datePublished": "2018-09-05T18:00:00", "dateReserved": "2018-09-05T00:00:00", "dateUpdated": "2024-08-05T10:24:32.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-16541\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-09-05T18:29:00.777\",\"lastModified\":\"2024-11-21T03:52:56.287\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.\"},{\"lang\":\"es\",\"value\":\"En Artifex Ghostscript en versiones anteriores a la 9.24, los atacantes que puedan proporcionar archivos PostScript manipulados podr\u00edan emplear una l\u00f3gica libre incorrecta en el reemplazo pagedevice para provocar el cierre inesperado del int\u00e9rprete.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.24\",\"matchCriteriaId\":\"73F68291-86CF-4BF7-A8A3-BFF7A4FDDD13\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3834\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.ghostscript.com/show_bug.cgi?id=699664\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201811-12\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3768-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.artifex.com/news/ghostscript-security-resolved/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4288\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3834\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.ghostscript.com/show_bug.cgi?id=699664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201811-12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3768-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.artifex.com/news/ghostscript-security-resolved/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
opensuse-su-2018:3687-1
Vulnerability from csaf_opensuse
Published
2018-11-09 08:34
Modified
2018-11-09 08:34
Summary
Security update for MozillaThunderbird
Notes
Title of the patch
Security update for MozillaThunderbird
Description of the patch
This update for Mozilla Thunderbird to version 60.2.1 fixes multiple issues.
Multiple security issues were fixed in the Mozilla platform as advised in MFSA 2018-25 and MFSA 2018-28.
In general, these flaws cannot be exploited through email in Thunderbird because scripting
is disabled when reading mail, but are potentially risks in browser or browser-like contexts:
- CVE-2018-12359: Prevent buffer overflow using computed size of canvas element (bsc#1098998)
- CVE-2018-12360: Prevent use-after-free when using focus() (bsc#1098998)
- CVE-2018-12361: Prevent integer overflow in SwizzleData (bsc#1098998)
- CVE-2018-12362: Prevent integer overflow in SSSE3 scaler (bsc#1098998)
- CVE-2018-5156: Prevent media recorder segmentation fault when track type is changed during capture (bsc#1098998)
- CVE-2018-12363: Prevent use-after-free when appending DOM nodes (bsc#1098998)
- CVE-2018-12364: Prevent CSRF attacks through 307 redirects and NPAPI plugins (bsc#1098998)
- CVE-2018-12365: Prevent compromised IPC child process listing local filenames (bsc#1098998)
- CVE-2018-12371: Prevent integer overflow in Skia library during edge builder allocation (bsc#1098998)
- CVE-2018-12366: Prevent invalid data handling during QCMS transformations (bsc#1098998)
- CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming (bsc#1098998)
- CVE-2018-5187: Various memory safety bugs (bsc#1098998)
- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343)
- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343)
- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1066489)
- CVE-2018-12376: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (bsc#1107343)
- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords (bsc#1107343)
- CVE-2018-12389: Fixed memory safety bugs (bsc#1112852)
- CVE-2018-12390: Fixed memory safety bugs (bsc#1112852)
- CVE-2018-12391: Fixed HTTP Live Stream audio data is accessible cross-origin (bsc#1112852)
- CVE-2018-12392: Fixed crash with nested event loops (bsc#1112852)
- CVE-2018-12393: Fixed integer overflow during Unicode conversion while loading JavaScript (bsc#1112852)
These non-security issues were fixed:
- Fix date display issues (bsc#1109379)
- Fix start-up crash due to folder name with special characters (bsc#1107772)
- Storing of remote content settings fixed (bsc#1084603)
- Improved message handling and composing
- Improved handling of message templates
- Support for OAuth2 and FIDO U2F
- Various Calendar improvements
- Various fixes and changes to e-mail workflow
- Various IMAP fixes
- Native desktop notifications
- various theme fixes
- Shift+PageUp/PageDown in Write window
- Gloda attachment filtering
- Mailing list address auto-complete enter/return handling
- Thunderbird hung if HTML signature references non-existent image
- Filters not working for headers that appear more than once
Patchnames
openSUSE-2018-1360
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for MozillaThunderbird", "title": "Title of the patch" }, { "category": "description", "text": "This update for Mozilla Thunderbird to version 60.2.1 fixes multiple issues.\n\nMultiple security issues were fixed in the Mozilla platform as advised in MFSA 2018-25 and MFSA 2018-28.\nIn general, these flaws cannot be exploited through email in Thunderbird because scripting\nis disabled when reading mail, but are potentially risks in browser or browser-like contexts:\n\n- CVE-2018-12359: Prevent buffer overflow using computed size of canvas element (bsc#1098998)\n- CVE-2018-12360: Prevent use-after-free when using focus() (bsc#1098998)\n- CVE-2018-12361: Prevent integer overflow in SwizzleData (bsc#1098998)\n- CVE-2018-12362: Prevent integer overflow in SSSE3 scaler (bsc#1098998)\n- CVE-2018-5156: Prevent media recorder segmentation fault when track type is changed during capture (bsc#1098998)\n- CVE-2018-12363: Prevent use-after-free when appending DOM nodes (bsc#1098998)\n- CVE-2018-12364: Prevent CSRF attacks through 307 redirects and NPAPI plugins (bsc#1098998)\n- CVE-2018-12365: Prevent compromised IPC child process listing local filenames (bsc#1098998)\n- CVE-2018-12371: Prevent integer overflow in Skia library during edge builder allocation (bsc#1098998)\n- CVE-2018-12366: Prevent invalid data handling during QCMS transformations (bsc#1098998)\n- CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming (bsc#1098998)\n- CVE-2018-5187: Various memory safety bugs (bsc#1098998)\n- CVE-2018-5188: Various memory safety bugs (bsc#1098998)\n- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343)\n- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343)\n- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1066489)\n- CVE-2018-12376: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (bsc#1107343)\n- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data (bsc#1109363)\n- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords (bsc#1107343)\n- CVE-2018-12389: Fixed memory safety bugs (bsc#1112852)\n- CVE-2018-12390: Fixed memory safety bugs (bsc#1112852)\n- CVE-2018-12391: Fixed HTTP Live Stream audio data is accessible cross-origin (bsc#1112852)\n- CVE-2018-12392: Fixed crash with nested event loops (bsc#1112852)\n- CVE-2018-12393: Fixed integer overflow during Unicode conversion while loading JavaScript (bsc#1112852)\n \nThese non-security issues were fixed:\n\n- Fix date display issues (bsc#1109379)\n- Fix start-up crash due to folder name with special characters (bsc#1107772)\n- Storing of remote content settings fixed (bsc#1084603)\n- Improved message handling and composing\n- Improved handling of message templates\n- Support for OAuth2 and FIDO U2F\n- Various Calendar improvements\n- Various fixes and changes to e-mail workflow \n- Various IMAP fixes\n- Native desktop notifications\n- various theme fixes\n- Shift+PageUp/PageDown in Write window\n- Gloda attachment filtering\n- Mailing list address auto-complete enter/return handling\n- Thunderbird hung if HTML signature references non-existent image\n- Filters not working for headers that appear more than once\n ", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2018-1360", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2018_3687-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2018:3687-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2018:3687-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" }, { "category": "self", "summary": "SUSE Bug 1066489", "url": "https://bugzilla.suse.com/1066489" }, { "category": "self", "summary": "SUSE Bug 1084603", "url": "https://bugzilla.suse.com/1084603" }, { "category": "self", "summary": "SUSE Bug 1098998", "url": "https://bugzilla.suse.com/1098998" }, { "category": "self", "summary": "SUSE Bug 1107343", "url": "https://bugzilla.suse.com/1107343" }, { "category": "self", "summary": "SUSE Bug 1107772", "url": "https://bugzilla.suse.com/1107772" }, { "category": "self", "summary": "SUSE Bug 1109363", "url": "https://bugzilla.suse.com/1109363" }, { "category": "self", "summary": "SUSE Bug 1109379", "url": "https://bugzilla.suse.com/1109379" }, { "category": "self", "summary": "SUSE Bug 1112852", "url": "https://bugzilla.suse.com/1112852" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16541 page", "url": "https://www.suse.com/security/cve/CVE-2017-16541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12359 page", "url": "https://www.suse.com/security/cve/CVE-2018-12359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12360 page", "url": "https://www.suse.com/security/cve/CVE-2018-12360/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12361 page", "url": "https://www.suse.com/security/cve/CVE-2018-12361/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12362 page", "url": "https://www.suse.com/security/cve/CVE-2018-12362/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12363 page", "url": "https://www.suse.com/security/cve/CVE-2018-12363/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12364 page", "url": "https://www.suse.com/security/cve/CVE-2018-12364/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12365 page", "url": "https://www.suse.com/security/cve/CVE-2018-12365/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12366 page", "url": "https://www.suse.com/security/cve/CVE-2018-12366/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12367 page", "url": "https://www.suse.com/security/cve/CVE-2018-12367/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12371 page", "url": "https://www.suse.com/security/cve/CVE-2018-12371/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12376 page", "url": "https://www.suse.com/security/cve/CVE-2018-12376/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12377 page", "url": "https://www.suse.com/security/cve/CVE-2018-12377/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12378 page", "url": "https://www.suse.com/security/cve/CVE-2018-12378/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12383 page", "url": "https://www.suse.com/security/cve/CVE-2018-12383/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12385 page", "url": "https://www.suse.com/security/cve/CVE-2018-12385/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12389 page", "url": "https://www.suse.com/security/cve/CVE-2018-12389/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12390 page", "url": "https://www.suse.com/security/cve/CVE-2018-12390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12391 page", "url": "https://www.suse.com/security/cve/CVE-2018-12391/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12392 page", "url": "https://www.suse.com/security/cve/CVE-2018-12392/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12393 page", "url": "https://www.suse.com/security/cve/CVE-2018-12393/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16541 page", "url": "https://www.suse.com/security/cve/CVE-2018-16541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5156 page", "url": "https://www.suse.com/security/cve/CVE-2018-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5187 page", "url": "https://www.suse.com/security/cve/CVE-2018-5187/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5188 page", "url": "https://www.suse.com/security/cve/CVE-2018-5188/" } ], "title": "Security update for MozillaThunderbird", "tracking": { "current_release_date": "2018-11-09T08:34:29Z", "generator": { "date": "2018-11-09T08:34:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2018:3687-1", "initial_release_date": "2018-11-09T08:34:29Z", "revision_history": [ { "date": "2018-11-09T08:34:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "MozillaThunderbird-60.3.0-74.2.x86_64", "product": { "name": "MozillaThunderbird-60.3.0-74.2.x86_64", "product_id": "MozillaThunderbird-60.3.0-74.2.x86_64" } }, { "category": "product_version", "name": "MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "product": { "name": "MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "product_id": "MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64" } }, { "category": "product_version", "name": "MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "product": { "name": "MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "product_id": "MozillaThunderbird-translations-common-60.3.0-74.2.x86_64" } }, { "category": "product_version", "name": "MozillaThunderbird-translations-other-60.3.0-74.2.x86_64", "product": { "name": "MozillaThunderbird-translations-other-60.3.0-74.2.x86_64", "product_id": "MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "MozillaThunderbird-60.3.0-74.2.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64" }, "product_reference": "MozillaThunderbird-60.3.0-74.2.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64" }, "product_reference": "MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaThunderbird-translations-common-60.3.0-74.2.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64" }, "product_reference": "MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaThunderbird-translations-other-60.3.0-74.2.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" }, "product_reference": "MozillaThunderbird-translations-other-60.3.0-74.2.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-16541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16541" } ], "notes": [ { "category": "general", "text": "Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16541", "url": "https://www.suse.com/security/cve/CVE-2017-16541" }, { "category": "external", "summary": "SUSE Bug 1066489 for CVE-2017-16541", "url": "https://bugzilla.suse.com/1066489" }, { "category": "external", "summary": "SUSE Bug 1107343 for CVE-2017-16541", "url": "https://bugzilla.suse.com/1107343" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "moderate" } ], "title": "CVE-2017-16541" }, { "cve": "CVE-2018-12359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12359" } ], "notes": [ { "category": "general", "text": "A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12359", "url": "https://www.suse.com/security/cve/CVE-2018-12359" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12359", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12359" }, { "cve": "CVE-2018-12360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12360" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12360", "url": "https://www.suse.com/security/cve/CVE-2018-12360" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12360", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12360" }, { "cve": "CVE-2018-12361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12361" } ], "notes": [ { "category": "general", "text": "An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12361", "url": "https://www.suse.com/security/cve/CVE-2018-12361" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12361", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12361" }, { "cve": "CVE-2018-12362", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12362" } ], "notes": [ { "category": "general", "text": "An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12362", "url": "https://www.suse.com/security/cve/CVE-2018-12362" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12362", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12362" }, { "cve": "CVE-2018-12363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12363" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12363", "url": "https://www.suse.com/security/cve/CVE-2018-12363" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12363", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12363" }, { "cve": "CVE-2018-12364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12364" } ], "notes": [ { "category": "general", "text": "NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12364", "url": "https://www.suse.com/security/cve/CVE-2018-12364" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12364", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12364" }, { "cve": "CVE-2018-12365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12365" } ], "notes": [ { "category": "general", "text": "A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12365", "url": "https://www.suse.com/security/cve/CVE-2018-12365" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12365", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12365" }, { "cve": "CVE-2018-12366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12366" } ], "notes": [ { "category": "general", "text": "An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12366", "url": "https://www.suse.com/security/cve/CVE-2018-12366" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12366", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12366" }, { "cve": "CVE-2018-12367", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12367" } ], "notes": [ { "category": "general", "text": "In the previous mitigations for Spectre, the resolution or precision of various methods was reduced to counteract the ability to measure precise time intervals. In that work PerformanceNavigationTiming was not adjusted but it was found that it could be used as a precision timer. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12367", "url": "https://www.suse.com/security/cve/CVE-2018-12367" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12367", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12367" }, { "cve": "CVE-2018-12371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12371" } ], "notes": [ { "category": "general", "text": "An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.1, Thunderbird \u003c 60, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12371", "url": "https://www.suse.com/security/cve/CVE-2018-12371" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12371", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12371" }, { "cve": "CVE-2018-12376", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12376" } ], "notes": [ { "category": "general", "text": "Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12376", "url": "https://www.suse.com/security/cve/CVE-2018-12376" }, { "category": "external", "summary": "SUSE Bug 1107343 for CVE-2018-12376", "url": "https://bugzilla.suse.com/1107343" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12376" }, { "cve": "CVE-2018-12377", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12377" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12377", "url": "https://www.suse.com/security/cve/CVE-2018-12377" }, { "category": "external", "summary": "SUSE Bug 1107343 for CVE-2018-12377", "url": "https://bugzilla.suse.com/1107343" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12377" }, { "cve": "CVE-2018-12378", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12378" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12378", "url": "https://www.suse.com/security/cve/CVE-2018-12378" }, { "category": "external", "summary": "SUSE Bug 1107343 for CVE-2018-12378", "url": "https://bugzilla.suse.com/1107343" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12378" }, { "cve": "CVE-2018-12383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12383" } ], "notes": [ { "category": "general", "text": "If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2.1, and Thunderbird \u003c 60.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12383", "url": "https://www.suse.com/security/cve/CVE-2018-12383" }, { "category": "external", "summary": "SUSE Bug 1107343 for CVE-2018-12383", "url": "https://bugzilla.suse.com/1107343" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12383" }, { "cve": "CVE-2018-12385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12385" } ], "notes": [ { "category": "general", "text": "A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird \u003c 60.2.1, Firefox ESR \u003c 60.2.1, and Firefox \u003c 62.0.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12385", "url": "https://www.suse.com/security/cve/CVE-2018-12385" }, { "category": "external", "summary": "SUSE Bug 1109363 for CVE-2018-12385", "url": "https://bugzilla.suse.com/1109363" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "moderate" } ], "title": "CVE-2018-12385" }, { "cve": "CVE-2018-12389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12389" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 60.3 and Thunderbird \u003c 60.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12389", "url": "https://www.suse.com/security/cve/CVE-2018-12389" }, { "category": "external", "summary": "SUSE Bug 1112852 for CVE-2018-12389", "url": "https://bugzilla.suse.com/1112852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12389" }, { "cve": "CVE-2018-12390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12390" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 63, Firefox ESR \u003c 60.3, and Thunderbird \u003c 60.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12390", "url": "https://www.suse.com/security/cve/CVE-2018-12390" }, { "category": "external", "summary": "SUSE Bug 1112852 for CVE-2018-12390", "url": "https://bugzilla.suse.com/1112852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12390" }, { "cve": "CVE-2018-12391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12391" } ], "notes": [ { "category": "general", "text": "During HTTP Live Stream playback on Firefox for Android, audio data can be accessed across origins in violation of security policies. Because the problem is in the underlying Android service, this issue is addressed by treating all HLS streams as cross-origin and opaque to access. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox \u003c 63, Firefox ESR \u003c 60.3, and Thunderbird \u003c 60.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12391", "url": "https://www.suse.com/security/cve/CVE-2018-12391" }, { "category": "external", "summary": "SUSE Bug 1112852 for CVE-2018-12391", "url": "https://bugzilla.suse.com/1112852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12391" }, { "cve": "CVE-2018-12392", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12392" } ], "notes": [ { "category": "general", "text": "When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox \u003c 63, Firefox ESR \u003c 60.3, and Thunderbird \u003c 60.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12392", "url": "https://www.suse.com/security/cve/CVE-2018-12392" }, { "category": "external", "summary": "SUSE Bug 1112852 for CVE-2018-12392", "url": "https://bugzilla.suse.com/1112852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12392" }, { "cve": "CVE-2018-12393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12393" } ], "notes": [ { "category": "general", "text": "A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox \u003c 63, Firefox ESR \u003c 60.3, and Thunderbird \u003c 60.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12393", "url": "https://www.suse.com/security/cve/CVE-2018-12393" }, { "category": "external", "summary": "SUSE Bug 1112852 for CVE-2018-12393", "url": "https://bugzilla.suse.com/1112852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-12393" }, { "cve": "CVE-2018-16541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16541" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16541", "url": "https://www.suse.com/security/cve/CVE-2018-16541" }, { "category": "external", "summary": "SUSE Bug 1107421 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1107421" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "moderate" } ], "title": "CVE-2018-16541" }, { "cve": "CVE-2018-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5156" } ], "notes": [ { "category": "general", "text": "A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5156", "url": "https://www.suse.com/security/cve/CVE-2018-5156" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-5156", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-5156" }, { "cve": "CVE-2018-5187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5187" } ], "notes": [ { "category": "general", "text": "Memory safety bugs present in Firefox 60 and Firefox ESR 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5187", "url": "https://www.suse.com/security/cve/CVE-2018-5187" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-5187", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-5187" }, { "cve": "CVE-2018-5188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5188" } ], "notes": [ { "category": "general", "text": "Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5188", "url": "https://www.suse.com/security/cve/CVE-2018-5188" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-5188", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-60.3.0-74.2.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-60.3.0-74.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-09T08:34:29Z", "details": "important" } ], "title": "CVE-2018-5188" } ] }
opensuse-su-2024:10783-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ghostscript-9.54.0-2.2 on GA media
Notes
Title of the patch
ghostscript-9.54.0-2.2 on GA media
Description of the patch
These are all security issues fixed in the ghostscript-9.54.0-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10783
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ghostscript-9.54.0-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ghostscript-9.54.0-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10783", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10783-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10217 page", "url": "https://www.suse.com/security/cve/CVE-2016-10217/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10218 page", "url": "https://www.suse.com/security/cve/CVE-2016-10218/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10219 page", "url": "https://www.suse.com/security/cve/CVE-2016-10219/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10220 page", "url": "https://www.suse.com/security/cve/CVE-2016-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10317 page", "url": "https://www.suse.com/security/cve/CVE-2016-10317/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5951 page", "url": "https://www.suse.com/security/cve/CVE-2017-5951/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7207 page", "url": "https://www.suse.com/security/cve/CVE-2017-7207/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8291 page", "url": "https://www.suse.com/security/cve/CVE-2017-8291/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9216 page", "url": "https://www.suse.com/security/cve/CVE-2017-9216/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10194 page", "url": "https://www.suse.com/security/cve/CVE-2018-10194/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15908 page", "url": "https://www.suse.com/security/cve/CVE-2018-15908/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15909 page", "url": "https://www.suse.com/security/cve/CVE-2018-15909/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15910 page", "url": "https://www.suse.com/security/cve/CVE-2018-15910/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15911 page", "url": "https://www.suse.com/security/cve/CVE-2018-15911/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16509 page", "url": "https://www.suse.com/security/cve/CVE-2018-16509/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16510 page", "url": "https://www.suse.com/security/cve/CVE-2018-16510/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16511 page", "url": "https://www.suse.com/security/cve/CVE-2018-16511/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16513 page", "url": "https://www.suse.com/security/cve/CVE-2018-16513/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16539 page", "url": "https://www.suse.com/security/cve/CVE-2018-16539/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16540 page", "url": "https://www.suse.com/security/cve/CVE-2018-16540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16541 page", "url": "https://www.suse.com/security/cve/CVE-2018-16541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16542 page", "url": "https://www.suse.com/security/cve/CVE-2018-16542/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16543 page", "url": "https://www.suse.com/security/cve/CVE-2018-16543/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16585 page", "url": "https://www.suse.com/security/cve/CVE-2018-16585/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16802 page", "url": "https://www.suse.com/security/cve/CVE-2018-16802/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17183 page", "url": "https://www.suse.com/security/cve/CVE-2018-17183/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17961 page", "url": "https://www.suse.com/security/cve/CVE-2018-17961/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18073 page", "url": "https://www.suse.com/security/cve/CVE-2018-18073/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18284 page", "url": "https://www.suse.com/security/cve/CVE-2018-18284/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19409 page", "url": "https://www.suse.com/security/cve/CVE-2018-19409/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19475 page", "url": "https://www.suse.com/security/cve/CVE-2018-19475/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19476 page", "url": "https://www.suse.com/security/cve/CVE-2018-19476/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19477 page", "url": "https://www.suse.com/security/cve/CVE-2018-19477/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6616 page", "url": "https://www.suse.com/security/cve/CVE-2018-6616/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10216 page", "url": "https://www.suse.com/security/cve/CVE-2019-10216/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12973 page", "url": "https://www.suse.com/security/cve/CVE-2019-12973/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14811 page", "url": "https://www.suse.com/security/cve/CVE-2019-14811/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14817 page", "url": "https://www.suse.com/security/cve/CVE-2019-14817/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3835 page", "url": "https://www.suse.com/security/cve/CVE-2019-3835/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3838 page", "url": "https://www.suse.com/security/cve/CVE-2019-3838/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6116 page", "url": "https://www.suse.com/security/cve/CVE-2019-6116/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12268 page", "url": "https://www.suse.com/security/cve/CVE-2020-12268/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15900 page", "url": "https://www.suse.com/security/cve/CVE-2020-15900/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3781 page", "url": "https://www.suse.com/security/cve/CVE-2021-3781/" } ], "title": "ghostscript-9.54.0-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10783-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-9.54.0-2.2.aarch64", "product": { "name": "ghostscript-9.54.0-2.2.aarch64", "product_id": "ghostscript-9.54.0-2.2.aarch64" } }, { "category": "product_version", "name": "ghostscript-devel-9.54.0-2.2.aarch64", "product": { "name": "ghostscript-devel-9.54.0-2.2.aarch64", "product_id": "ghostscript-devel-9.54.0-2.2.aarch64" } }, { "category": "product_version", "name": "ghostscript-x11-9.54.0-2.2.aarch64", "product": { "name": "ghostscript-x11-9.54.0-2.2.aarch64", "product_id": "ghostscript-x11-9.54.0-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.54.0-2.2.ppc64le", "product": { "name": "ghostscript-9.54.0-2.2.ppc64le", "product_id": "ghostscript-9.54.0-2.2.ppc64le" } }, { "category": "product_version", "name": "ghostscript-devel-9.54.0-2.2.ppc64le", "product": { "name": "ghostscript-devel-9.54.0-2.2.ppc64le", "product_id": "ghostscript-devel-9.54.0-2.2.ppc64le" } }, { "category": "product_version", "name": "ghostscript-x11-9.54.0-2.2.ppc64le", "product": { "name": "ghostscript-x11-9.54.0-2.2.ppc64le", "product_id": "ghostscript-x11-9.54.0-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.54.0-2.2.s390x", "product": { "name": "ghostscript-9.54.0-2.2.s390x", "product_id": "ghostscript-9.54.0-2.2.s390x" } }, { "category": "product_version", "name": "ghostscript-devel-9.54.0-2.2.s390x", "product": { "name": "ghostscript-devel-9.54.0-2.2.s390x", "product_id": "ghostscript-devel-9.54.0-2.2.s390x" } }, { "category": "product_version", "name": "ghostscript-x11-9.54.0-2.2.s390x", "product": { "name": "ghostscript-x11-9.54.0-2.2.s390x", "product_id": "ghostscript-x11-9.54.0-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.54.0-2.2.x86_64", "product": { "name": "ghostscript-9.54.0-2.2.x86_64", "product_id": "ghostscript-9.54.0-2.2.x86_64" } }, { "category": "product_version", "name": "ghostscript-devel-9.54.0-2.2.x86_64", "product": { "name": "ghostscript-devel-9.54.0-2.2.x86_64", "product_id": "ghostscript-devel-9.54.0-2.2.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-9.54.0-2.2.x86_64", "product": { "name": "ghostscript-x11-9.54.0-2.2.x86_64", "product_id": "ghostscript-x11-9.54.0-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.54.0-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64" }, "product_reference": "ghostscript-9.54.0-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.54.0-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le" }, "product_reference": "ghostscript-9.54.0-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.54.0-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x" }, "product_reference": "ghostscript-9.54.0-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.54.0-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64" }, "product_reference": "ghostscript-9.54.0-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.54.0-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64" }, "product_reference": "ghostscript-devel-9.54.0-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.54.0-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le" }, "product_reference": "ghostscript-devel-9.54.0-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.54.0-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x" }, "product_reference": "ghostscript-devel-9.54.0-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.54.0-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64" }, "product_reference": "ghostscript-devel-9.54.0-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.54.0-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64" }, "product_reference": "ghostscript-x11-9.54.0-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.54.0-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le" }, "product_reference": "ghostscript-x11-9.54.0-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.54.0-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x" }, "product_reference": "ghostscript-x11-9.54.0-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.54.0-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" }, "product_reference": "ghostscript-x11-9.54.0-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10217", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10217" } ], "notes": [ { "category": "general", "text": "The pdf14_open function in base/gdevp14.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file that is mishandled in the color management module.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10217", "url": "https://www.suse.com/security/cve/CVE-2016-10217" }, { "category": "external", "summary": "SUSE Bug 1032130 for CVE-2016-10217", "url": "https://bugzilla.suse.com/1032130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10217" }, { "cve": "CVE-2016-10218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10218" } ], "notes": [ { "category": "general", "text": "The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10218", "url": "https://www.suse.com/security/cve/CVE-2016-10218" }, { "category": "external", "summary": "SUSE Bug 1032135 for CVE-2016-10218", "url": "https://bugzilla.suse.com/1032135" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10218" }, { "cve": "CVE-2016-10219", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10219" } ], "notes": [ { "category": "general", "text": "The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10219", "url": "https://www.suse.com/security/cve/CVE-2016-10219" }, { "category": "external", "summary": "SUSE Bug 1032138 for CVE-2016-10219", "url": "https://bugzilla.suse.com/1032138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10219" }, { "cve": "CVE-2016-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10220" } ], "notes": [ { "category": "general", "text": "The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10220", "url": "https://www.suse.com/security/cve/CVE-2016-10220" }, { "category": "external", "summary": "SUSE Bug 1032120 for CVE-2016-10220", "url": "https://bugzilla.suse.com/1032120" }, { "category": "external", "summary": "SUSE Bug 1036453 for CVE-2016-10220", "url": "https://bugzilla.suse.com/1036453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-10220" }, { "cve": "CVE-2016-10317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10317" } ], "notes": [ { "category": "general", "text": "The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10317", "url": "https://www.suse.com/security/cve/CVE-2016-10317" }, { "category": "external", "summary": "SUSE Bug 1032230 for CVE-2016-10317", "url": "https://bugzilla.suse.com/1032230" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10317" }, { "cve": "CVE-2017-5951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5951" } ], "notes": [ { "category": "general", "text": "The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5951", "url": "https://www.suse.com/security/cve/CVE-2017-5951" }, { "category": "external", "summary": "SUSE Bug 1032114 for CVE-2017-5951", "url": "https://bugzilla.suse.com/1032114" }, { "category": "external", "summary": "SUSE Bug 1036453 for CVE-2017-5951", "url": "https://bugzilla.suse.com/1036453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-5951" }, { "cve": "CVE-2017-7207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7207" } ], "notes": [ { "category": "general", "text": "The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7207", "url": "https://www.suse.com/security/cve/CVE-2017-7207" }, { "category": "external", "summary": "SUSE Bug 1030263 for CVE-2017-7207", "url": "https://bugzilla.suse.com/1030263" }, { "category": "external", "summary": "SUSE Bug 1036453 for CVE-2017-7207", "url": "https://bugzilla.suse.com/1036453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-7207" }, { "cve": "CVE-2017-8291", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8291" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a \"/OutputFile (%pipe%\" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8291", "url": "https://www.suse.com/security/cve/CVE-2017-8291" }, { "category": "external", "summary": "SUSE Bug 1036453 for CVE-2017-8291", "url": "https://bugzilla.suse.com/1036453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8291" }, { "cve": "CVE-2017-9216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9216" } ], "notes": [ { "category": "general", "text": "libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9216", "url": "https://www.suse.com/security/cve/CVE-2017-9216" }, { "category": "external", "summary": "SUSE Bug 1040643 for CVE-2017-9216", "url": "https://bugzilla.suse.com/1040643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-9216" }, { "cve": "CVE-2018-10194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10194" } ], "notes": [ { "category": "general", "text": "The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10194", "url": "https://www.suse.com/security/cve/CVE-2018-10194" }, { "category": "external", "summary": "SUSE Bug 1090099 for CVE-2018-10194", "url": "https://bugzilla.suse.com/1090099" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10194" }, { "cve": "CVE-2018-15908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15908" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15908", "url": "https://www.suse.com/security/cve/CVE-2018-15908" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106171 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1106171" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15908" }, { "cve": "CVE-2018-15909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15909" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15909", "url": "https://www.suse.com/security/cve/CVE-2018-15909" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106172 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1106172" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15909" }, { "cve": "CVE-2018-15910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15910" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15910", "url": "https://www.suse.com/security/cve/CVE-2018-15910" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106173 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1106173" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15910" }, { "cve": "CVE-2018-15911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15911" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15911", "url": "https://www.suse.com/security/cve/CVE-2018-15911" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106195 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1106195" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15911" }, { "cve": "CVE-2018-16509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16509" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect \"restoration of privilege\" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16509", "url": "https://www.suse.com/security/cve/CVE-2018-16509" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1118318 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1118318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16509" }, { "cve": "CVE-2018-16510", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16510" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the \"CS\" and \"SC\" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16510", "url": "https://www.suse.com/security/cve/CVE-2018-16510" }, { "category": "external", "summary": "SUSE Bug 1107411 for CVE-2018-16510", "url": "https://bugzilla.suse.com/1107411" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16510" }, { "cve": "CVE-2018-16511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16511" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in \"ztype\" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16511", "url": "https://www.suse.com/security/cve/CVE-2018-16511" }, { "category": "external", "summary": "SUSE Bug 1107426 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1107426" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1112229" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16511" }, { "cve": "CVE-2018-16513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16513" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16513", "url": "https://www.suse.com/security/cve/CVE-2018-16513" }, { "category": "external", "summary": "SUSE Bug 1107412 for CVE-2018-16513", "url": "https://bugzilla.suse.com/1107412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16513" }, { "cve": "CVE-2018-16539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16539" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16539", "url": "https://www.suse.com/security/cve/CVE-2018-16539" }, { "category": "external", "summary": "SUSE Bug 1107422 for CVE-2018-16539", "url": "https://bugzilla.suse.com/1107422" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16539" }, { "cve": "CVE-2018-16540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16540" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16540", "url": "https://www.suse.com/security/cve/CVE-2018-16540" }, { "category": "external", "summary": "SUSE Bug 1107420 for CVE-2018-16540", "url": "https://bugzilla.suse.com/1107420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16540" }, { "cve": "CVE-2018-16541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16541" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16541", "url": "https://www.suse.com/security/cve/CVE-2018-16541" }, { "category": "external", "summary": "SUSE Bug 1107421 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1107421" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16541" }, { "cve": "CVE-2018-16542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16542" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16542", "url": "https://www.suse.com/security/cve/CVE-2018-16542" }, { "category": "external", "summary": "SUSE Bug 1107413 for CVE-2018-16542", "url": "https://bugzilla.suse.com/1107413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16542" }, { "cve": "CVE-2018-16543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16543" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16543", "url": "https://www.suse.com/security/cve/CVE-2018-16543" }, { "category": "external", "summary": "SUSE Bug 1107423 for CVE-2018-16543", "url": "https://bugzilla.suse.com/1107423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16543" }, { "cve": "CVE-2018-16585", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16585" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16585", "url": "https://www.suse.com/security/cve/CVE-2018-16585" }, { "category": "external", "summary": "SUSE Bug 1107581 for CVE-2018-16585", "url": "https://bugzilla.suse.com/1107581" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-16585" }, { "cve": "CVE-2018-16802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16802" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.25. Incorrect \"restoration of privilege\" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction. This is due to an incomplete fix for CVE-2018-16509.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16802", "url": "https://www.suse.com/security/cve/CVE-2018-16802" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117327 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117327" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16802" }, { "cve": "CVE-2018-17183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17183" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17183", "url": "https://www.suse.com/security/cve/CVE-2018-17183" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117331" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-17183" }, { "cve": "CVE-2018-17961", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17961" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17961", "url": "https://www.suse.com/security/cve/CVE-2018-17961" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-17961", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-17961", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-17961", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-17961", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-17961", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-17961", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-17961", "url": "https://bugzilla.suse.com/1117331" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-17961", "url": "https://bugzilla.suse.com/1118455" }, { "category": "external", "summary": "SUSE Bug 1129180 for CVE-2018-17961", "url": "https://bugzilla.suse.com/1129180" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-17961" }, { "cve": "CVE-2018-18073", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18073" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18073", "url": "https://www.suse.com/security/cve/CVE-2018-18073" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-18073", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-18073", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-18073", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-18073", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-18073", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-18073", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-18073", "url": "https://bugzilla.suse.com/1117331" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-18073", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18073" }, { "cve": "CVE-2018-18284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18284" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18284", "url": "https://www.suse.com/security/cve/CVE-2018-18284" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-18284", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-18284", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-18284", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-18284", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-18284", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-18284", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-18284", "url": "https://bugzilla.suse.com/1117331" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-18284", "url": "https://bugzilla.suse.com/1118455" }, { "category": "external", "summary": "SUSE Bug 1144621 for CVE-2018-18284", "url": "https://bugzilla.suse.com/1144621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18284" }, { "cve": "CVE-2018-19409", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19409" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19409", "url": "https://www.suse.com/security/cve/CVE-2018-19409" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-19409", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-19409", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-19409", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-19409", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-19409", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-19409", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-19409", "url": "https://bugzilla.suse.com/1117331" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-19409", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-19409" }, { "cve": "CVE-2018-19475", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19475" } ], "notes": [ { "category": "general", "text": "psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19475", "url": "https://www.suse.com/security/cve/CVE-2018-19475" }, { "category": "external", "summary": "SUSE Bug 1117327 for CVE-2018-19475", "url": "https://bugzilla.suse.com/1117327" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-19475", "url": "https://bugzilla.suse.com/1117331" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19475" }, { "cve": "CVE-2018-19476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19476" } ], "notes": [ { "category": "general", "text": "psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a setcolorspace type confusion.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19476", "url": "https://www.suse.com/security/cve/CVE-2018-19476" }, { "category": "external", "summary": "SUSE Bug 1117313 for CVE-2018-19476", "url": "https://bugzilla.suse.com/1117313" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-19476", "url": "https://bugzilla.suse.com/1117331" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-19476" }, { "cve": "CVE-2018-19477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19477" } ], "notes": [ { "category": "general", "text": "psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19477", "url": "https://www.suse.com/security/cve/CVE-2018-19477" }, { "category": "external", "summary": "SUSE Bug 1117274 for CVE-2018-19477", "url": "https://bugzilla.suse.com/1117274" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-19477", "url": "https://bugzilla.suse.com/1117331" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-19477" }, { "cve": "CVE-2018-6616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6616" } ], "notes": [ { "category": "general", "text": "In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6616", "url": "https://www.suse.com/security/cve/CVE-2018-6616" }, { "category": "external", "summary": "SUSE Bug 1079845 for CVE-2018-6616", "url": "https://bugzilla.suse.com/1079845" }, { "category": "external", "summary": "SUSE Bug 1140359 for CVE-2018-6616", "url": "https://bugzilla.suse.com/1140359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-6616" }, { "cve": "CVE-2019-10216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10216" } ], "notes": [ { "category": "general", "text": "In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10216", "url": "https://www.suse.com/security/cve/CVE-2019-10216" }, { "category": "external", "summary": "SUSE Bug 1144621 for CVE-2019-10216", "url": "https://bugzilla.suse.com/1144621" }, { "category": "external", "summary": "SUSE Bug 1146882 for CVE-2019-10216", "url": "https://bugzilla.suse.com/1146882" }, { "category": "external", "summary": "SUSE Bug 1146884 for CVE-2019-10216", "url": "https://bugzilla.suse.com/1146884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10216" }, { "cve": "CVE-2019-12973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12973" } ], "notes": [ { "category": "general", "text": "In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12973", "url": "https://www.suse.com/security/cve/CVE-2019-12973" }, { "category": "external", "summary": "SUSE Bug 1140359 for CVE-2019-12973", "url": "https://bugzilla.suse.com/1140359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-12973" }, { "cve": "CVE-2019-14811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14811" } ], "notes": [ { "category": "general", "text": "A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14811", "url": "https://www.suse.com/security/cve/CVE-2019-14811" }, { "category": "external", "summary": "SUSE Bug 1146882 for CVE-2019-14811", "url": "https://bugzilla.suse.com/1146882" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14811" }, { "cve": "CVE-2019-14817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14817" } ], "notes": [ { "category": "general", "text": "A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14817", "url": "https://www.suse.com/security/cve/CVE-2019-14817" }, { "category": "external", "summary": "SUSE Bug 1146882 for CVE-2019-14817", "url": "https://bugzilla.suse.com/1146882" }, { "category": "external", "summary": "SUSE Bug 1146884 for CVE-2019-14817", "url": "https://bugzilla.suse.com/1146884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14817" }, { "cve": "CVE-2019-3835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3835" } ], "notes": [ { "category": "general", "text": "It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3835", "url": "https://www.suse.com/security/cve/CVE-2019-3835" }, { "category": "external", "summary": "SUSE Bug 1129180 for CVE-2019-3835", "url": "https://bugzilla.suse.com/1129180" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-3835" }, { "cve": "CVE-2019-3838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3838" } ], "notes": [ { "category": "general", "text": "It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3838", "url": "https://www.suse.com/security/cve/CVE-2019-3838" }, { "category": "external", "summary": "SUSE Bug 1018128 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1018128" }, { "category": "external", "summary": "SUSE Bug 1030263 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1030263" }, { "category": "external", "summary": "SUSE Bug 1032135 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1032135" }, { "category": "external", "summary": "SUSE Bug 1038835 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1038835" }, { "category": "external", "summary": "SUSE Bug 1050888 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1050888" }, { "category": "external", "summary": "SUSE Bug 1050889 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1050889" }, { "category": "external", "summary": "SUSE Bug 1106171 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1106171" }, { "category": "external", "summary": "SUSE Bug 1106172 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1106172" }, { "category": "external", "summary": "SUSE Bug 1106173 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1106173" }, { "category": "external", "summary": "SUSE Bug 1107422 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1107422" }, { "category": "external", "summary": "SUSE Bug 1107423 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1107423" }, { "category": "external", "summary": "SUSE Bug 1107581 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1107581" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1114495 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1114495" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117327 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1117327" }, { "category": "external", "summary": "SUSE Bug 1118318 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1118318" }, { "category": "external", "summary": "SUSE Bug 1129180 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1129180" }, { "category": "external", "summary": "SUSE Bug 1129186 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1129186" }, { "category": "external", "summary": "SUSE Bug 1136756 for CVE-2019-3838", "url": "https://bugzilla.suse.com/1136756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-3838" }, { "cve": "CVE-2019-6116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6116" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6116", "url": "https://www.suse.com/security/cve/CVE-2019-6116" }, { "category": "external", "summary": "SUSE Bug 1122319 for CVE-2019-6116", "url": "https://bugzilla.suse.com/1122319" }, { "category": "external", "summary": "SUSE Bug 1129186 for CVE-2019-6116", "url": "https://bugzilla.suse.com/1129186" }, { "category": "external", "summary": "SUSE Bug 1134156 for CVE-2019-6116", "url": "https://bugzilla.suse.com/1134156" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6116" }, { "cve": "CVE-2020-12268", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12268" } ], "notes": [ { "category": "general", "text": "jbig2_image_compose in jbig2_image.c in Artifex jbig2dec before 0.18 has a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12268", "url": "https://www.suse.com/security/cve/CVE-2020-12268" }, { "category": "external", "summary": "SUSE Bug 1170603 for CVE-2020-12268", "url": "https://bugzilla.suse.com/1170603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12268" }, { "cve": "CVE-2020-15900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15900" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The \u0027rsearch\u0027 calculation for the \u0027post\u0027 size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15900", "url": "https://www.suse.com/security/cve/CVE-2020-15900" }, { "category": "external", "summary": "SUSE Bug 1174415 for CVE-2020-15900", "url": "https://bugzilla.suse.com/1174415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-15900" }, { "cve": "CVE-2021-3781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3781" } ], "notes": [ { "category": "general", "text": "A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3781", "url": "https://www.suse.com/security/cve/CVE-2021-3781" }, { "category": "external", "summary": "SUSE Bug 1190381 for CVE-2021-3781", "url": "https://bugzilla.suse.com/1190381" }, { "category": "external", "summary": "SUSE Bug 1191712 for CVE-2021-3781", "url": "https://bugzilla.suse.com/1191712" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-devel-9.54.0-2.2.x86_64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.aarch64", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.s390x", "openSUSE Tumbleweed:ghostscript-x11-9.54.0-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2021-3781" } ] }
suse-su-2018:2976-1
Vulnerability from csaf_suse
Published
2018-10-02 14:31
Modified
2018-10-02 14:31
Summary
Security update for ghostscript
Notes
Title of the patch
Security update for ghostscript
Description of the patch
This update for ghostscript to version 9.25 fixes the following issues:
These security issues were fixed:
- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
have been used by attackers able to supply crafted PostScript files to crash
the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
PostScript files to bypass .tempfile restrictions and write files
(bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
that could have been used to crash the interpreter or execute code
(bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
operator that could have been used to crash the interpreter or potentially
execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
have been used to crash the interpreter or possibly have unspecified other
impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
of /invalidaccess exceptions could be have been used by attackers able to
supply crafted PostScript to execute code using the 'pipe' instruction
(bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
primitives could have been used by remote attackers able to supply crafted PDFs
to crash the interpreter or possibly have unspecified other impact
(bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
from using insufficient interpreter stack-size checking during error handling
to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
from using incorrect free logic in pagedevice replacement to crash the
interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
been used to crash the interpreter or possibly have unspecified other impact
(bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
from using incorrect access checking in temp file handling to disclose contents
of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
attackers able to supply crafted PostScript to crash the interpreter or
possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
though it is not intended for use during document processing (e.g., after the
startup phase). This lead to memory corruption, allowing remote attackers able
to supply crafted PostScript to crash the interpreter or possibly have
unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
out of stack during exception handling could have been used by attackers able
to supply crafted PostScript to execute code using the 'pipe' instruction. This
is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).
These non-security issues were fixed:
* Fixes problems with argument handling, some unintended results of the
security fixes to the SAFER file access restrictions (specifically accessing
ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'
For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-2119,SUSE-SLE-Module-Desktop-Applications-15-2018-2119
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ghostscript", "title": "Title of the patch" }, { "category": "description", "text": "This update for ghostscript to version 9.25 fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to\n potentially overwrite or replace error handlers to inject code (bsc#1109105)\n- CVE-2018-15909: Prevent type confusion using the .shfill operator that could\n have been used by attackers able to supply crafted PostScript files to crash\n the interpreter or potentially execute code (bsc#1106172).\n- CVE-2018-15908: Prevent attackers that are able to supply malicious\n PostScript files to bypass .tempfile restrictions and write files\n (bsc#1106171).\n- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter\n that could have been used to crash the interpreter or execute code\n (bsc#1106173).\n- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode\n operator that could have been used to crash the interpreter or potentially\n execute code (bsc#1106195).\n- CVE-2018-16513: Prevent a type confusion in the setcolor function that could\n have been used to crash the interpreter or possibly have unspecified other\n impact (bsc#1107412).\n- CVE-2018-16509: Incorrect \u0027restoration of privilege\u0027 checking during handling\n of /invalidaccess exceptions could be have been used by attackers able to\n supply crafted PostScript to execute code using the \u0027pipe\u0027 instruction\n (bsc#1107410).\n- CVE-2018-16510: Incorrect exec stack handling in the \u0027CS\u0027 and \u0027SC\u0027 PDF\n primitives could have been used by remote attackers able to supply crafted PDFs\n to crash the interpreter or possibly have unspecified other impact\n (bsc#1107411).\n- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files\n from using insufficient interpreter stack-size checking during error handling\n to crash the interpreter (bsc#1107413).\n- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files\n from using incorrect free logic in pagedevice replacement to crash the\n interpreter (bsc#1107421).\n- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have\n been used to crash the interpreter or possibly have unspecified other impact\n (bsc#1107420).\n- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files\n from using incorrect access checking in temp file handling to disclose contents\n of files on the system otherwise not readable (bsc#1107422).\n- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have\n an unspecified impact (bsc#1107423).\n- CVE-2018-16511: A type confusion in \u0027ztype\u0027 could have been used by remote\n attackers able to supply crafted PostScript to crash the interpreter or\n possibly have unspecified other impact (bsc#1107426).\n- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even\n though it is not intended for use during document processing (e.g., after the\n startup phase). This lead to memory corruption, allowing remote attackers able\n to supply crafted PostScript to crash the interpreter or possibly have\n unspecified other impact (bsc#1107581).\n- CVE-2018-16802: Incorrect \u0027restoration of privilege\u0027 checking when running\n out of stack during exception handling could have been used by attackers able\n to supply crafted PostScript to execute code using the \u0027pipe\u0027 instruction. This\n is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).\n\nThese non-security issues were fixed:\n\n* Fixes problems with argument handling, some unintended results of the\n security fixes to the SAFER file access restrictions (specifically accessing\n ICC profile files).\n* Avoid that ps2epsi fails with \u0027Error: /undefined in --setpagedevice--\u0027\n\nFor additional changes please check http://www.ghostscript.com/doc/9.25/News.htm\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Basesystem-15-2018-2119,SUSE-SLE-Module-Desktop-Applications-15-2018-2119", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2976-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2976-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182976-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2976-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" }, { "category": "self", "summary": "SUSE Bug 1106171", "url": "https://bugzilla.suse.com/1106171" }, { "category": "self", "summary": "SUSE Bug 1106172", "url": "https://bugzilla.suse.com/1106172" }, { "category": "self", "summary": "SUSE Bug 1106173", "url": "https://bugzilla.suse.com/1106173" }, { "category": "self", "summary": "SUSE Bug 1106195", "url": "https://bugzilla.suse.com/1106195" }, { "category": "self", "summary": "SUSE Bug 1107410", "url": "https://bugzilla.suse.com/1107410" }, { "category": "self", "summary": "SUSE Bug 1107411", "url": "https://bugzilla.suse.com/1107411" }, { "category": "self", "summary": "SUSE Bug 1107412", "url": "https://bugzilla.suse.com/1107412" }, { "category": "self", "summary": "SUSE Bug 1107413", "url": "https://bugzilla.suse.com/1107413" }, { "category": "self", "summary": "SUSE Bug 1107420", "url": "https://bugzilla.suse.com/1107420" }, { "category": "self", "summary": "SUSE Bug 1107421", "url": "https://bugzilla.suse.com/1107421" }, { "category": "self", "summary": "SUSE Bug 1107422", "url": "https://bugzilla.suse.com/1107422" }, { "category": "self", "summary": "SUSE Bug 1107423", "url": "https://bugzilla.suse.com/1107423" }, { "category": "self", "summary": "SUSE Bug 1107426", "url": "https://bugzilla.suse.com/1107426" }, { "category": "self", "summary": "SUSE Bug 1107581", "url": "https://bugzilla.suse.com/1107581" }, { "category": "self", "summary": "SUSE Bug 1108027", "url": "https://bugzilla.suse.com/1108027" }, { "category": "self", "summary": "SUSE Bug 1109105", "url": "https://bugzilla.suse.com/1109105" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15908 page", "url": "https://www.suse.com/security/cve/CVE-2018-15908/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15909 page", "url": "https://www.suse.com/security/cve/CVE-2018-15909/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15910 page", "url": "https://www.suse.com/security/cve/CVE-2018-15910/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15911 page", "url": "https://www.suse.com/security/cve/CVE-2018-15911/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16509 page", "url": "https://www.suse.com/security/cve/CVE-2018-16509/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16510 page", "url": "https://www.suse.com/security/cve/CVE-2018-16510/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16511 page", "url": "https://www.suse.com/security/cve/CVE-2018-16511/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16513 page", "url": "https://www.suse.com/security/cve/CVE-2018-16513/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16539 page", "url": "https://www.suse.com/security/cve/CVE-2018-16539/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16540 page", "url": "https://www.suse.com/security/cve/CVE-2018-16540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16541 page", "url": "https://www.suse.com/security/cve/CVE-2018-16541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16542 page", "url": "https://www.suse.com/security/cve/CVE-2018-16542/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16543 page", "url": "https://www.suse.com/security/cve/CVE-2018-16543/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16585 page", "url": "https://www.suse.com/security/cve/CVE-2018-16585/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16802 page", "url": "https://www.suse.com/security/cve/CVE-2018-16802/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17183 page", "url": "https://www.suse.com/security/cve/CVE-2018-17183/" } ], "title": "Security update for ghostscript", "tracking": { "current_release_date": "2018-10-02T14:31:31Z", "generator": { "date": "2018-10-02T14:31:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2976-1", "initial_release_date": "2018-10-02T14:31:31Z", "revision_history": [ { "date": "2018-10-02T14:31:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-9.25-3.6.1.aarch64", "product": { "name": "ghostscript-9.25-3.6.1.aarch64", "product_id": "ghostscript-9.25-3.6.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-devel-9.25-3.6.1.aarch64", "product": { "name": "ghostscript-devel-9.25-3.6.1.aarch64", "product_id": "ghostscript-devel-9.25-3.6.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-3.6.1.aarch64", "product": { "name": "ghostscript-x11-9.25-3.6.1.aarch64", "product_id": "ghostscript-x11-9.25-3.6.1.aarch64" } }, { "category": "product_version", "name": "libspectre-devel-0.2.8-3.2.1.aarch64", "product": { "name": "libspectre-devel-0.2.8-3.2.1.aarch64", "product_id": "libspectre-devel-0.2.8-3.2.1.aarch64" } }, { "category": "product_version", "name": "libspectre1-0.2.8-3.2.1.aarch64", "product": { "name": "libspectre1-0.2.8-3.2.1.aarch64", "product_id": "libspectre1-0.2.8-3.2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.25-3.6.1.ppc64le", "product": { "name": "ghostscript-9.25-3.6.1.ppc64le", "product_id": "ghostscript-9.25-3.6.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-devel-9.25-3.6.1.ppc64le", "product": { "name": "ghostscript-devel-9.25-3.6.1.ppc64le", "product_id": "ghostscript-devel-9.25-3.6.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-3.6.1.ppc64le", "product": { "name": "ghostscript-x11-9.25-3.6.1.ppc64le", "product_id": "ghostscript-x11-9.25-3.6.1.ppc64le" } }, { "category": "product_version", "name": "libspectre-devel-0.2.8-3.2.1.ppc64le", "product": { "name": "libspectre-devel-0.2.8-3.2.1.ppc64le", "product_id": "libspectre-devel-0.2.8-3.2.1.ppc64le" } }, { "category": "product_version", "name": "libspectre1-0.2.8-3.2.1.ppc64le", "product": { "name": "libspectre1-0.2.8-3.2.1.ppc64le", "product_id": "libspectre1-0.2.8-3.2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.25-3.6.1.s390x", "product": { "name": "ghostscript-9.25-3.6.1.s390x", "product_id": "ghostscript-9.25-3.6.1.s390x" } }, { "category": "product_version", "name": "ghostscript-devel-9.25-3.6.1.s390x", "product": { "name": "ghostscript-devel-9.25-3.6.1.s390x", "product_id": "ghostscript-devel-9.25-3.6.1.s390x" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-3.6.1.s390x", "product": { "name": "ghostscript-x11-9.25-3.6.1.s390x", "product_id": "ghostscript-x11-9.25-3.6.1.s390x" } }, { "category": "product_version", "name": "libspectre-devel-0.2.8-3.2.1.s390x", "product": { "name": "libspectre-devel-0.2.8-3.2.1.s390x", "product_id": "libspectre-devel-0.2.8-3.2.1.s390x" } }, { "category": "product_version", "name": "libspectre1-0.2.8-3.2.1.s390x", "product": { "name": "libspectre1-0.2.8-3.2.1.s390x", "product_id": "libspectre1-0.2.8-3.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.25-3.6.1.x86_64", "product": { "name": "ghostscript-9.25-3.6.1.x86_64", "product_id": "ghostscript-9.25-3.6.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-devel-9.25-3.6.1.x86_64", "product": { "name": "ghostscript-devel-9.25-3.6.1.x86_64", "product_id": "ghostscript-devel-9.25-3.6.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-3.6.1.x86_64", "product": { "name": "ghostscript-x11-9.25-3.6.1.x86_64", "product_id": "ghostscript-x11-9.25-3.6.1.x86_64" } }, { "category": "product_version", "name": "libspectre-devel-0.2.8-3.2.1.x86_64", "product": { "name": "libspectre-devel-0.2.8-3.2.1.x86_64", "product_id": "libspectre-devel-0.2.8-3.2.1.x86_64" } }, { "category": "product_version", "name": "libspectre1-0.2.8-3.2.1.x86_64", "product": { "name": "libspectre1-0.2.8-3.2.1.x86_64", "product_id": "libspectre1-0.2.8-3.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64" }, "product_reference": "ghostscript-9.25-3.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le" }, "product_reference": "ghostscript-9.25-3.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x" }, "product_reference": "ghostscript-9.25-3.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64" }, "product_reference": "ghostscript-9.25-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.25-3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64" }, "product_reference": "ghostscript-devel-9.25-3.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.25-3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le" }, "product_reference": "ghostscript-devel-9.25-3.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.25-3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x" }, "product_reference": "ghostscript-devel-9.25-3.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.25-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64" }, "product_reference": "ghostscript-devel-9.25-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64" }, "product_reference": "ghostscript-x11-9.25-3.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le" }, "product_reference": "ghostscript-x11-9.25-3.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x" }, "product_reference": "ghostscript-x11-9.25-3.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libspectre-devel-0.2.8-3.2.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64" }, "product_reference": "libspectre-devel-0.2.8-3.2.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libspectre-devel-0.2.8-3.2.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le" }, "product_reference": "libspectre-devel-0.2.8-3.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libspectre-devel-0.2.8-3.2.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x" }, "product_reference": "libspectre-devel-0.2.8-3.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libspectre-devel-0.2.8-3.2.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64" }, "product_reference": "libspectre-devel-0.2.8-3.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libspectre1-0.2.8-3.2.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64" }, "product_reference": "libspectre1-0.2.8-3.2.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libspectre1-0.2.8-3.2.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le" }, "product_reference": "libspectre1-0.2.8-3.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libspectre1-0.2.8-3.2.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x" }, "product_reference": "libspectre1-0.2.8-3.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libspectre1-0.2.8-3.2.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" }, "product_reference": "libspectre1-0.2.8-3.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15908" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15908", "url": "https://www.suse.com/security/cve/CVE-2018-15908" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106171 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1106171" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-15908" }, { "cve": "CVE-2018-15909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15909" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15909", "url": "https://www.suse.com/security/cve/CVE-2018-15909" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106172 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1106172" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-15909" }, { "cve": "CVE-2018-15910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15910" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15910", "url": "https://www.suse.com/security/cve/CVE-2018-15910" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106173 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1106173" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-15910" }, { "cve": "CVE-2018-15911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15911" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15911", "url": "https://www.suse.com/security/cve/CVE-2018-15911" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106195 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1106195" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-15911" }, { "cve": "CVE-2018-16509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16509" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect \"restoration of privilege\" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16509", "url": "https://www.suse.com/security/cve/CVE-2018-16509" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1118318 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1118318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16509" }, { "cve": "CVE-2018-16510", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16510" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the \"CS\" and \"SC\" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16510", "url": "https://www.suse.com/security/cve/CVE-2018-16510" }, { "category": "external", "summary": "SUSE Bug 1107411 for CVE-2018-16510", "url": "https://bugzilla.suse.com/1107411" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16510" }, { "cve": "CVE-2018-16511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16511" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in \"ztype\" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16511", "url": "https://www.suse.com/security/cve/CVE-2018-16511" }, { "category": "external", "summary": "SUSE Bug 1107426 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1107426" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1112229" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16511" }, { "cve": "CVE-2018-16513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16513" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16513", "url": "https://www.suse.com/security/cve/CVE-2018-16513" }, { "category": "external", "summary": "SUSE Bug 1107412 for CVE-2018-16513", "url": "https://bugzilla.suse.com/1107412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16513" }, { "cve": "CVE-2018-16539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16539" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16539", "url": "https://www.suse.com/security/cve/CVE-2018-16539" }, { "category": "external", "summary": "SUSE Bug 1107422 for CVE-2018-16539", "url": "https://bugzilla.suse.com/1107422" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16539" }, { "cve": "CVE-2018-16540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16540" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16540", "url": "https://www.suse.com/security/cve/CVE-2018-16540" }, { "category": "external", "summary": "SUSE Bug 1107420 for CVE-2018-16540", "url": "https://bugzilla.suse.com/1107420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16540" }, { "cve": "CVE-2018-16541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16541" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16541", "url": "https://www.suse.com/security/cve/CVE-2018-16541" }, { "category": "external", "summary": "SUSE Bug 1107421 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1107421" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16541" }, { "cve": "CVE-2018-16542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16542" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16542", "url": "https://www.suse.com/security/cve/CVE-2018-16542" }, { "category": "external", "summary": "SUSE Bug 1107413 for CVE-2018-16542", "url": "https://bugzilla.suse.com/1107413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16542" }, { "cve": "CVE-2018-16543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16543" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16543", "url": "https://www.suse.com/security/cve/CVE-2018-16543" }, { "category": "external", "summary": "SUSE Bug 1107423 for CVE-2018-16543", "url": "https://bugzilla.suse.com/1107423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16543" }, { "cve": "CVE-2018-16585", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16585" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16585", "url": "https://www.suse.com/security/cve/CVE-2018-16585" }, { "category": "external", "summary": "SUSE Bug 1107581 for CVE-2018-16585", "url": "https://bugzilla.suse.com/1107581" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "low" } ], "title": "CVE-2018-16585" }, { "cve": "CVE-2018-16802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16802" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.25. Incorrect \"restoration of privilege\" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction. This is due to an incomplete fix for CVE-2018-16509.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16802", "url": "https://www.suse.com/security/cve/CVE-2018-16802" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117327 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117327" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-16802" }, { "cve": "CVE-2018-17183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17183" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17183", "url": "https://www.suse.com/security/cve/CVE-2018-17183" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117331" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-devel-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:ghostscript-x11-9.25-3.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre-devel-0.2.8-3.2.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libspectre1-0.2.8-3.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:31:31Z", "details": "moderate" } ], "title": "CVE-2018-17183" } ] }
suse-su-2018:2975-3
Vulnerability from csaf_suse
Published
2019-04-27 15:19
Modified
2019-04-27 15:19
Summary
Security update for ghostscript
Notes
Title of the patch
Security update for ghostscript
Description of the patch
This update for ghostscript to version 9.25 fixes the following issues:
These security issues were fixed:
- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
have been used by attackers able to supply crafted PostScript files to crash
the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
PostScript files to bypass .tempfile restrictions and write files
(bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
that could have been used to crash the interpreter or execute code
(bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
operator that could have been used to crash the interpreter or potentially
execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
have been used to crash the interpreter or possibly have unspecified other
impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
of /invalidaccess exceptions could be have been used by attackers able to
supply crafted PostScript to execute code using the 'pipe' instruction
(bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
primitives could have been used by remote attackers able to supply crafted PDFs
to crash the interpreter or possibly have unspecified other impact
(bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
from using insufficient interpreter stack-size checking during error handling
to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
from using incorrect free logic in pagedevice replacement to crash the
interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
been used to crash the interpreter or possibly have unspecified other impact
(bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
from using incorrect access checking in temp file handling to disclose contents
of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
attackers able to supply crafted PostScript to crash the interpreter or
possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
though it is not intended for use during document processing (e.g., after the
startup phase). This lead to memory corruption, allowing remote attackers able
to supply crafted PostScript to crash the interpreter or possibly have
unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
out of stack during exception handling could have been used by attackers able
to supply crafted PostScript to execute code using the 'pipe' instruction. This
is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).
These non-security issues were fixed:
* Fixes problems with argument handling, some unintended results of the
security fixes to the SAFER file access restrictions (specifically accessing
ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'
For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
Patchnames
SUSE-SLE-SAP-12-SP1-2019-1074
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ghostscript", "title": "Title of the patch" }, { "category": "description", "text": "This update for ghostscript to version 9.25 fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to\n potentially overwrite or replace error handlers to inject code (bsc#1109105)\n- CVE-2018-15909: Prevent type confusion using the .shfill operator that could\n have been used by attackers able to supply crafted PostScript files to crash\n the interpreter or potentially execute code (bsc#1106172).\n- CVE-2018-15908: Prevent attackers that are able to supply malicious\n PostScript files to bypass .tempfile restrictions and write files\n (bsc#1106171).\n- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter\n that could have been used to crash the interpreter or execute code\n (bsc#1106173).\n- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode\n operator that could have been used to crash the interpreter or potentially\n execute code (bsc#1106195).\n- CVE-2018-16513: Prevent a type confusion in the setcolor function that could\n have been used to crash the interpreter or possibly have unspecified other\n impact (bsc#1107412).\n- CVE-2018-16509: Incorrect \u0027restoration of privilege\u0027 checking during handling\n of /invalidaccess exceptions could be have been used by attackers able to\n supply crafted PostScript to execute code using the \u0027pipe\u0027 instruction\n (bsc#1107410).\n- CVE-2018-16510: Incorrect exec stack handling in the \u0027CS\u0027 and \u0027SC\u0027 PDF\n primitives could have been used by remote attackers able to supply crafted PDFs\n to crash the interpreter or possibly have unspecified other impact\n (bsc#1107411).\n- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files\n from using insufficient interpreter stack-size checking during error handling\n to crash the interpreter (bsc#1107413).\n- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files\n from using incorrect free logic in pagedevice replacement to crash the\n interpreter (bsc#1107421).\n- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have\n been used to crash the interpreter or possibly have unspecified other impact\n (bsc#1107420).\n- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files\n from using incorrect access checking in temp file handling to disclose contents\n of files on the system otherwise not readable (bsc#1107422).\n- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have\n an unspecified impact (bsc#1107423).\n- CVE-2018-16511: A type confusion in \u0027ztype\u0027 could have been used by remote\n attackers able to supply crafted PostScript to crash the interpreter or\n possibly have unspecified other impact (bsc#1107426).\n- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even\n though it is not intended for use during document processing (e.g., after the\n startup phase). This lead to memory corruption, allowing remote attackers able\n to supply crafted PostScript to crash the interpreter or possibly have\n unspecified other impact (bsc#1107581).\n- CVE-2018-16802: Incorrect \u0027restoration of privilege\u0027 checking when running\n out of stack during exception handling could have been used by attackers able\n to supply crafted PostScript to execute code using the \u0027pipe\u0027 instruction. This\n is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).\n\nThese non-security issues were fixed:\n\n* Fixes problems with argument handling, some unintended results of the\n security fixes to the SAFER file access restrictions (specifically accessing\n ICC profile files).\n* Avoid that ps2epsi fails with \u0027Error: /undefined in --setpagedevice--\u0027\n\nFor additional changes please check http://www.ghostscript.com/doc/9.25/News.htm\nand the changes file of the package.\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2019-1074", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2975-3.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2975-3", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182975-3/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2975-3", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" }, { "category": "self", "summary": "SUSE Bug 1106171", "url": "https://bugzilla.suse.com/1106171" }, { "category": "self", "summary": "SUSE Bug 1106172", "url": "https://bugzilla.suse.com/1106172" }, { "category": "self", "summary": "SUSE Bug 1106173", "url": "https://bugzilla.suse.com/1106173" }, { "category": "self", "summary": "SUSE Bug 1106195", "url": "https://bugzilla.suse.com/1106195" }, { "category": "self", "summary": "SUSE Bug 1107410", "url": "https://bugzilla.suse.com/1107410" }, { "category": "self", "summary": "SUSE Bug 1107411", "url": "https://bugzilla.suse.com/1107411" }, { "category": "self", "summary": "SUSE Bug 1107412", "url": "https://bugzilla.suse.com/1107412" }, { "category": "self", "summary": "SUSE Bug 1107413", "url": "https://bugzilla.suse.com/1107413" }, { "category": "self", "summary": "SUSE Bug 1107420", "url": "https://bugzilla.suse.com/1107420" }, { "category": "self", "summary": "SUSE Bug 1107421", "url": "https://bugzilla.suse.com/1107421" }, { "category": "self", "summary": "SUSE Bug 1107422", "url": "https://bugzilla.suse.com/1107422" }, { "category": "self", "summary": "SUSE Bug 1107423", "url": "https://bugzilla.suse.com/1107423" }, { "category": "self", "summary": "SUSE Bug 1107426", "url": "https://bugzilla.suse.com/1107426" }, { "category": "self", "summary": "SUSE Bug 1107581", "url": "https://bugzilla.suse.com/1107581" }, { "category": "self", "summary": "SUSE Bug 1108027", "url": "https://bugzilla.suse.com/1108027" }, { "category": "self", "summary": "SUSE Bug 1109105", "url": "https://bugzilla.suse.com/1109105" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15908 page", "url": "https://www.suse.com/security/cve/CVE-2018-15908/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15909 page", "url": "https://www.suse.com/security/cve/CVE-2018-15909/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15910 page", "url": "https://www.suse.com/security/cve/CVE-2018-15910/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15911 page", "url": "https://www.suse.com/security/cve/CVE-2018-15911/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16509 page", "url": "https://www.suse.com/security/cve/CVE-2018-16509/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16510 page", "url": "https://www.suse.com/security/cve/CVE-2018-16510/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16511 page", "url": "https://www.suse.com/security/cve/CVE-2018-16511/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16513 page", "url": "https://www.suse.com/security/cve/CVE-2018-16513/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16539 page", "url": "https://www.suse.com/security/cve/CVE-2018-16539/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16540 page", "url": "https://www.suse.com/security/cve/CVE-2018-16540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16541 page", "url": "https://www.suse.com/security/cve/CVE-2018-16541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16542 page", "url": "https://www.suse.com/security/cve/CVE-2018-16542/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16543 page", "url": "https://www.suse.com/security/cve/CVE-2018-16543/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16585 page", "url": "https://www.suse.com/security/cve/CVE-2018-16585/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16802 page", "url": "https://www.suse.com/security/cve/CVE-2018-16802/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17183 page", "url": "https://www.suse.com/security/cve/CVE-2018-17183/" } ], "title": "Security update for ghostscript", "tracking": { "current_release_date": "2019-04-27T15:19:13Z", "generator": { "date": "2019-04-27T15:19:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2975-3", "initial_release_date": "2019-04-27T15:19:13Z", "revision_history": [ { "date": "2019-04-27T15:19:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-9.25-23.13.1.x86_64", "product": { "name": "ghostscript-9.25-23.13.1.x86_64", "product_id": "ghostscript-9.25-23.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-23.13.1.x86_64", "product": { "name": "ghostscript-x11-9.25-23.13.1.x86_64", "product_id": "ghostscript-x11-9.25-23.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15908" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15908", "url": "https://www.suse.com/security/cve/CVE-2018-15908" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106171 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1106171" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-15908" }, { "cve": "CVE-2018-15909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15909" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15909", "url": "https://www.suse.com/security/cve/CVE-2018-15909" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106172 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1106172" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-15909" }, { "cve": "CVE-2018-15910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15910" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15910", "url": "https://www.suse.com/security/cve/CVE-2018-15910" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106173 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1106173" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-15910" }, { "cve": "CVE-2018-15911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15911" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15911", "url": "https://www.suse.com/security/cve/CVE-2018-15911" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106195 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1106195" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-15911" }, { "cve": "CVE-2018-16509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16509" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect \"restoration of privilege\" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16509", "url": "https://www.suse.com/security/cve/CVE-2018-16509" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1118318 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1118318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16509" }, { "cve": "CVE-2018-16510", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16510" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the \"CS\" and \"SC\" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16510", "url": "https://www.suse.com/security/cve/CVE-2018-16510" }, { "category": "external", "summary": "SUSE Bug 1107411 for CVE-2018-16510", "url": "https://bugzilla.suse.com/1107411" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16510" }, { "cve": "CVE-2018-16511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16511" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in \"ztype\" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16511", "url": "https://www.suse.com/security/cve/CVE-2018-16511" }, { "category": "external", "summary": "SUSE Bug 1107426 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1107426" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1112229" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16511" }, { "cve": "CVE-2018-16513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16513" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16513", "url": "https://www.suse.com/security/cve/CVE-2018-16513" }, { "category": "external", "summary": "SUSE Bug 1107412 for CVE-2018-16513", "url": "https://bugzilla.suse.com/1107412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16513" }, { "cve": "CVE-2018-16539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16539" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16539", "url": "https://www.suse.com/security/cve/CVE-2018-16539" }, { "category": "external", "summary": "SUSE Bug 1107422 for CVE-2018-16539", "url": "https://bugzilla.suse.com/1107422" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16539" }, { "cve": "CVE-2018-16540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16540" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16540", "url": "https://www.suse.com/security/cve/CVE-2018-16540" }, { "category": "external", "summary": "SUSE Bug 1107420 for CVE-2018-16540", "url": "https://bugzilla.suse.com/1107420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16540" }, { "cve": "CVE-2018-16541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16541" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16541", "url": "https://www.suse.com/security/cve/CVE-2018-16541" }, { "category": "external", "summary": "SUSE Bug 1107421 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1107421" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16541" }, { "cve": "CVE-2018-16542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16542" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16542", "url": "https://www.suse.com/security/cve/CVE-2018-16542" }, { "category": "external", "summary": "SUSE Bug 1107413 for CVE-2018-16542", "url": "https://bugzilla.suse.com/1107413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16542" }, { "cve": "CVE-2018-16543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16543" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16543", "url": "https://www.suse.com/security/cve/CVE-2018-16543" }, { "category": "external", "summary": "SUSE Bug 1107423 for CVE-2018-16543", "url": "https://bugzilla.suse.com/1107423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16543" }, { "cve": "CVE-2018-16585", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16585" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16585", "url": "https://www.suse.com/security/cve/CVE-2018-16585" }, { "category": "external", "summary": "SUSE Bug 1107581 for CVE-2018-16585", "url": "https://bugzilla.suse.com/1107581" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "low" } ], "title": "CVE-2018-16585" }, { "cve": "CVE-2018-16802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16802" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.25. Incorrect \"restoration of privilege\" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction. This is due to an incomplete fix for CVE-2018-16509.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16802", "url": "https://www.suse.com/security/cve/CVE-2018-16802" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117327 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117327" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-16802" }, { "cve": "CVE-2018-17183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17183" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17183", "url": "https://www.suse.com/security/cve/CVE-2018-17183" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117331" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T15:19:13Z", "details": "moderate" } ], "title": "CVE-2018-17183" } ] }
suse-su-2018:2975-2
Vulnerability from csaf_suse
Published
2018-10-18 12:51
Modified
2018-10-18 12:51
Summary
Security update for ghostscript
Notes
Title of the patch
Security update for ghostscript
Description of the patch
This update for ghostscript to version 9.25 fixes the following issues:
These security issues were fixed:
- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
have been used by attackers able to supply crafted PostScript files to crash
the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
PostScript files to bypass .tempfile restrictions and write files
(bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
that could have been used to crash the interpreter or execute code
(bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
operator that could have been used to crash the interpreter or potentially
execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
have been used to crash the interpreter or possibly have unspecified other
impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
of /invalidaccess exceptions could be have been used by attackers able to
supply crafted PostScript to execute code using the 'pipe' instruction
(bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
primitives could have been used by remote attackers able to supply crafted PDFs
to crash the interpreter or possibly have unspecified other impact
(bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
from using insufficient interpreter stack-size checking during error handling
to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
from using incorrect free logic in pagedevice replacement to crash the
interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
been used to crash the interpreter or possibly have unspecified other impact
(bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
from using incorrect access checking in temp file handling to disclose contents
of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
attackers able to supply crafted PostScript to crash the interpreter or
possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
though it is not intended for use during document processing (e.g., after the
startup phase). This lead to memory corruption, allowing remote attackers able
to supply crafted PostScript to crash the interpreter or possibly have
unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
out of stack during exception handling could have been used by attackers able
to supply crafted PostScript to execute code using the 'pipe' instruction. This
is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).
These non-security issues were fixed:
* Fixes problems with argument handling, some unintended results of the
security fixes to the SAFER file access restrictions (specifically accessing
ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'
For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
Patchnames
SUSE-SLE-SERVER-12-SP2-BCL-2018-2121
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ghostscript", "title": "Title of the patch" }, { "category": "description", "text": "This update for ghostscript to version 9.25 fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to\n potentially overwrite or replace error handlers to inject code (bsc#1109105)\n- CVE-2018-15909: Prevent type confusion using the .shfill operator that could\n have been used by attackers able to supply crafted PostScript files to crash\n the interpreter or potentially execute code (bsc#1106172).\n- CVE-2018-15908: Prevent attackers that are able to supply malicious\n PostScript files to bypass .tempfile restrictions and write files\n (bsc#1106171).\n- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter\n that could have been used to crash the interpreter or execute code\n (bsc#1106173).\n- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode\n operator that could have been used to crash the interpreter or potentially\n execute code (bsc#1106195).\n- CVE-2018-16513: Prevent a type confusion in the setcolor function that could\n have been used to crash the interpreter or possibly have unspecified other\n impact (bsc#1107412).\n- CVE-2018-16509: Incorrect \u0027restoration of privilege\u0027 checking during handling\n of /invalidaccess exceptions could be have been used by attackers able to\n supply crafted PostScript to execute code using the \u0027pipe\u0027 instruction\n (bsc#1107410).\n- CVE-2018-16510: Incorrect exec stack handling in the \u0027CS\u0027 and \u0027SC\u0027 PDF\n primitives could have been used by remote attackers able to supply crafted PDFs\n to crash the interpreter or possibly have unspecified other impact\n (bsc#1107411).\n- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files\n from using insufficient interpreter stack-size checking during error handling\n to crash the interpreter (bsc#1107413).\n- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files\n from using incorrect free logic in pagedevice replacement to crash the\n interpreter (bsc#1107421).\n- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have\n been used to crash the interpreter or possibly have unspecified other impact\n (bsc#1107420).\n- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files\n from using incorrect access checking in temp file handling to disclose contents\n of files on the system otherwise not readable (bsc#1107422).\n- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have\n an unspecified impact (bsc#1107423).\n- CVE-2018-16511: A type confusion in \u0027ztype\u0027 could have been used by remote\n attackers able to supply crafted PostScript to crash the interpreter or\n possibly have unspecified other impact (bsc#1107426).\n- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even\n though it is not intended for use during document processing (e.g., after the\n startup phase). This lead to memory corruption, allowing remote attackers able\n to supply crafted PostScript to crash the interpreter or possibly have\n unspecified other impact (bsc#1107581).\n- CVE-2018-16802: Incorrect \u0027restoration of privilege\u0027 checking when running\n out of stack during exception handling could have been used by attackers able\n to supply crafted PostScript to execute code using the \u0027pipe\u0027 instruction. This\n is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).\n\nThese non-security issues were fixed:\n\n* Fixes problems with argument handling, some unintended results of the\n security fixes to the SAFER file access restrictions (specifically accessing\n ICC profile files).\n* Avoid that ps2epsi fails with \u0027Error: /undefined in --setpagedevice--\u0027\n\nFor additional changes please check http://www.ghostscript.com/doc/9.25/News.htm\nand the changes file of the package.\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-2121", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2975-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2975-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182975-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2975-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" }, { "category": "self", "summary": "SUSE Bug 1106171", "url": "https://bugzilla.suse.com/1106171" }, { "category": "self", "summary": "SUSE Bug 1106172", "url": "https://bugzilla.suse.com/1106172" }, { "category": "self", "summary": "SUSE Bug 1106173", "url": "https://bugzilla.suse.com/1106173" }, { "category": "self", "summary": "SUSE Bug 1106195", "url": "https://bugzilla.suse.com/1106195" }, { "category": "self", "summary": "SUSE Bug 1107410", "url": "https://bugzilla.suse.com/1107410" }, { "category": "self", "summary": "SUSE Bug 1107411", "url": "https://bugzilla.suse.com/1107411" }, { "category": "self", "summary": "SUSE Bug 1107412", "url": "https://bugzilla.suse.com/1107412" }, { "category": "self", "summary": "SUSE Bug 1107413", "url": "https://bugzilla.suse.com/1107413" }, { "category": "self", "summary": "SUSE Bug 1107420", "url": "https://bugzilla.suse.com/1107420" }, { "category": "self", "summary": "SUSE Bug 1107421", "url": "https://bugzilla.suse.com/1107421" }, { "category": "self", "summary": "SUSE Bug 1107422", "url": "https://bugzilla.suse.com/1107422" }, { "category": "self", "summary": "SUSE Bug 1107423", "url": "https://bugzilla.suse.com/1107423" }, { "category": "self", "summary": "SUSE Bug 1107426", "url": "https://bugzilla.suse.com/1107426" }, { "category": "self", "summary": "SUSE Bug 1107581", "url": "https://bugzilla.suse.com/1107581" }, { "category": "self", "summary": "SUSE Bug 1108027", "url": "https://bugzilla.suse.com/1108027" }, { "category": "self", "summary": "SUSE Bug 1109105", "url": "https://bugzilla.suse.com/1109105" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15908 page", "url": "https://www.suse.com/security/cve/CVE-2018-15908/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15909 page", "url": "https://www.suse.com/security/cve/CVE-2018-15909/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15910 page", "url": "https://www.suse.com/security/cve/CVE-2018-15910/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15911 page", "url": "https://www.suse.com/security/cve/CVE-2018-15911/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16509 page", "url": "https://www.suse.com/security/cve/CVE-2018-16509/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16510 page", "url": "https://www.suse.com/security/cve/CVE-2018-16510/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16511 page", "url": "https://www.suse.com/security/cve/CVE-2018-16511/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16513 page", "url": "https://www.suse.com/security/cve/CVE-2018-16513/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16539 page", "url": "https://www.suse.com/security/cve/CVE-2018-16539/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16540 page", "url": "https://www.suse.com/security/cve/CVE-2018-16540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16541 page", "url": "https://www.suse.com/security/cve/CVE-2018-16541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16542 page", "url": "https://www.suse.com/security/cve/CVE-2018-16542/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16543 page", "url": "https://www.suse.com/security/cve/CVE-2018-16543/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16585 page", "url": "https://www.suse.com/security/cve/CVE-2018-16585/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16802 page", "url": "https://www.suse.com/security/cve/CVE-2018-16802/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17183 page", "url": "https://www.suse.com/security/cve/CVE-2018-17183/" } ], "title": "Security update for ghostscript", "tracking": { "current_release_date": "2018-10-18T12:51:24Z", "generator": { "date": "2018-10-18T12:51:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2975-2", "initial_release_date": "2018-10-18T12:51:24Z", "revision_history": [ { "date": "2018-10-18T12:51:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-9.25-23.13.1.x86_64", "product": { "name": "ghostscript-9.25-23.13.1.x86_64", "product_id": "ghostscript-9.25-23.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-23.13.1.x86_64", "product": { "name": "ghostscript-x11-9.25-23.13.1.x86_64", "product_id": "ghostscript-x11-9.25-23.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15908" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15908", "url": "https://www.suse.com/security/cve/CVE-2018-15908" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106171 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1106171" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-15908" }, { "cve": "CVE-2018-15909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15909" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15909", "url": "https://www.suse.com/security/cve/CVE-2018-15909" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106172 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1106172" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-15909" }, { "cve": "CVE-2018-15910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15910" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15910", "url": "https://www.suse.com/security/cve/CVE-2018-15910" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106173 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1106173" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-15910" }, { "cve": "CVE-2018-15911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15911" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15911", "url": "https://www.suse.com/security/cve/CVE-2018-15911" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106195 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1106195" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-15911" }, { "cve": "CVE-2018-16509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16509" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect \"restoration of privilege\" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16509", "url": "https://www.suse.com/security/cve/CVE-2018-16509" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1118318 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1118318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16509" }, { "cve": "CVE-2018-16510", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16510" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the \"CS\" and \"SC\" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16510", "url": "https://www.suse.com/security/cve/CVE-2018-16510" }, { "category": "external", "summary": "SUSE Bug 1107411 for CVE-2018-16510", "url": "https://bugzilla.suse.com/1107411" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16510" }, { "cve": "CVE-2018-16511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16511" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in \"ztype\" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16511", "url": "https://www.suse.com/security/cve/CVE-2018-16511" }, { "category": "external", "summary": "SUSE Bug 1107426 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1107426" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1112229" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16511" }, { "cve": "CVE-2018-16513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16513" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16513", "url": "https://www.suse.com/security/cve/CVE-2018-16513" }, { "category": "external", "summary": "SUSE Bug 1107412 for CVE-2018-16513", "url": "https://bugzilla.suse.com/1107412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16513" }, { "cve": "CVE-2018-16539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16539" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16539", "url": "https://www.suse.com/security/cve/CVE-2018-16539" }, { "category": "external", "summary": "SUSE Bug 1107422 for CVE-2018-16539", "url": "https://bugzilla.suse.com/1107422" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16539" }, { "cve": "CVE-2018-16540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16540" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16540", "url": "https://www.suse.com/security/cve/CVE-2018-16540" }, { "category": "external", "summary": "SUSE Bug 1107420 for CVE-2018-16540", "url": "https://bugzilla.suse.com/1107420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16540" }, { "cve": "CVE-2018-16541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16541" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16541", "url": "https://www.suse.com/security/cve/CVE-2018-16541" }, { "category": "external", "summary": "SUSE Bug 1107421 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1107421" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16541" }, { "cve": "CVE-2018-16542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16542" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16542", "url": "https://www.suse.com/security/cve/CVE-2018-16542" }, { "category": "external", "summary": "SUSE Bug 1107413 for CVE-2018-16542", "url": "https://bugzilla.suse.com/1107413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16542" }, { "cve": "CVE-2018-16543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16543" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16543", "url": "https://www.suse.com/security/cve/CVE-2018-16543" }, { "category": "external", "summary": "SUSE Bug 1107423 for CVE-2018-16543", "url": "https://bugzilla.suse.com/1107423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16543" }, { "cve": "CVE-2018-16585", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16585" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16585", "url": "https://www.suse.com/security/cve/CVE-2018-16585" }, { "category": "external", "summary": "SUSE Bug 1107581 for CVE-2018-16585", "url": "https://bugzilla.suse.com/1107581" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "low" } ], "title": "CVE-2018-16585" }, { "cve": "CVE-2018-16802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16802" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.25. Incorrect \"restoration of privilege\" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction. This is due to an incomplete fix for CVE-2018-16509.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16802", "url": "https://www.suse.com/security/cve/CVE-2018-16802" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117327 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117327" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-16802" }, { "cve": "CVE-2018-17183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17183" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17183", "url": "https://www.suse.com/security/cve/CVE-2018-17183" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117331" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:51:24Z", "details": "moderate" } ], "title": "CVE-2018-17183" } ] }
suse-su-2018:2975-1
Vulnerability from csaf_suse
Published
2018-10-02 14:51
Modified
2018-10-02 14:51
Summary
Security update for ghostscript
Notes
Title of the patch
Security update for ghostscript
Description of the patch
This update for ghostscript to version 9.25 fixes the following issues:
These security issues were fixed:
- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
have been used by attackers able to supply crafted PostScript files to crash
the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
PostScript files to bypass .tempfile restrictions and write files
(bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
that could have been used to crash the interpreter or execute code
(bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
operator that could have been used to crash the interpreter or potentially
execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
have been used to crash the interpreter or possibly have unspecified other
impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
of /invalidaccess exceptions could be have been used by attackers able to
supply crafted PostScript to execute code using the 'pipe' instruction
(bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
primitives could have been used by remote attackers able to supply crafted PDFs
to crash the interpreter or possibly have unspecified other impact
(bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
from using insufficient interpreter stack-size checking during error handling
to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
from using incorrect free logic in pagedevice replacement to crash the
interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
been used to crash the interpreter or possibly have unspecified other impact
(bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
from using incorrect access checking in temp file handling to disclose contents
of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
attackers able to supply crafted PostScript to crash the interpreter or
possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
though it is not intended for use during document processing (e.g., after the
startup phase). This lead to memory corruption, allowing remote attackers able
to supply crafted PostScript to crash the interpreter or possibly have
unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
out of stack during exception handling could have been used by attackers able
to supply crafted PostScript to execute code using the 'pipe' instruction. This
is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).
These non-security issues were fixed:
* Fixes problems with argument handling, some unintended results of the
security fixes to the SAFER file access restrictions (specifically accessing
ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'
For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
Patchnames
SUSE-OpenStack-Cloud-7-2018-2121,SUSE-SLE-DESKTOP-12-SP3-2018-2121,SUSE-SLE-SAP-12-SP2-2018-2121,SUSE-SLE-SDK-12-SP3-2018-2121,SUSE-SLE-SERVER-12-2018-2121,SUSE-SLE-SERVER-12-SP1-2018-2121,SUSE-SLE-SERVER-12-SP2-2018-2121,SUSE-SLE-SERVER-12-SP3-2018-2121,SUSE-Storage-4-2018-2121
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ghostscript", "title": "Title of the patch" }, { "category": "description", "text": "This update for ghostscript to version 9.25 fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to\n potentially overwrite or replace error handlers to inject code (bsc#1109105)\n- CVE-2018-15909: Prevent type confusion using the .shfill operator that could\n have been used by attackers able to supply crafted PostScript files to crash\n the interpreter or potentially execute code (bsc#1106172).\n- CVE-2018-15908: Prevent attackers that are able to supply malicious\n PostScript files to bypass .tempfile restrictions and write files\n (bsc#1106171).\n- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter\n that could have been used to crash the interpreter or execute code\n (bsc#1106173).\n- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode\n operator that could have been used to crash the interpreter or potentially\n execute code (bsc#1106195).\n- CVE-2018-16513: Prevent a type confusion in the setcolor function that could\n have been used to crash the interpreter or possibly have unspecified other\n impact (bsc#1107412).\n- CVE-2018-16509: Incorrect \u0027restoration of privilege\u0027 checking during handling\n of /invalidaccess exceptions could be have been used by attackers able to\n supply crafted PostScript to execute code using the \u0027pipe\u0027 instruction\n (bsc#1107410).\n- CVE-2018-16510: Incorrect exec stack handling in the \u0027CS\u0027 and \u0027SC\u0027 PDF\n primitives could have been used by remote attackers able to supply crafted PDFs\n to crash the interpreter or possibly have unspecified other impact\n (bsc#1107411).\n- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files\n from using insufficient interpreter stack-size checking during error handling\n to crash the interpreter (bsc#1107413).\n- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files\n from using incorrect free logic in pagedevice replacement to crash the\n interpreter (bsc#1107421).\n- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have\n been used to crash the interpreter or possibly have unspecified other impact\n (bsc#1107420).\n- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files\n from using incorrect access checking in temp file handling to disclose contents\n of files on the system otherwise not readable (bsc#1107422).\n- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have\n an unspecified impact (bsc#1107423).\n- CVE-2018-16511: A type confusion in \u0027ztype\u0027 could have been used by remote\n attackers able to supply crafted PostScript to crash the interpreter or\n possibly have unspecified other impact (bsc#1107426).\n- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even\n though it is not intended for use during document processing (e.g., after the\n startup phase). This lead to memory corruption, allowing remote attackers able\n to supply crafted PostScript to crash the interpreter or possibly have\n unspecified other impact (bsc#1107581).\n- CVE-2018-16802: Incorrect \u0027restoration of privilege\u0027 checking when running\n out of stack during exception handling could have been used by attackers able\n to supply crafted PostScript to execute code using the \u0027pipe\u0027 instruction. This\n is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).\n\nThese non-security issues were fixed:\n\n* Fixes problems with argument handling, some unintended results of the\n security fixes to the SAFER file access restrictions (specifically accessing\n ICC profile files).\n* Avoid that ps2epsi fails with \u0027Error: /undefined in --setpagedevice--\u0027\n\nFor additional changes please check http://www.ghostscript.com/doc/9.25/News.htm\nand the changes file of the package.\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-7-2018-2121,SUSE-SLE-DESKTOP-12-SP3-2018-2121,SUSE-SLE-SAP-12-SP2-2018-2121,SUSE-SLE-SDK-12-SP3-2018-2121,SUSE-SLE-SERVER-12-2018-2121,SUSE-SLE-SERVER-12-SP1-2018-2121,SUSE-SLE-SERVER-12-SP2-2018-2121,SUSE-SLE-SERVER-12-SP3-2018-2121,SUSE-Storage-4-2018-2121", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2975-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2975-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182975-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2975-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" }, { "category": "self", "summary": "SUSE Bug 1106171", "url": "https://bugzilla.suse.com/1106171" }, { "category": "self", "summary": "SUSE Bug 1106172", "url": "https://bugzilla.suse.com/1106172" }, { "category": "self", "summary": "SUSE Bug 1106173", "url": "https://bugzilla.suse.com/1106173" }, { "category": "self", "summary": "SUSE Bug 1106195", "url": "https://bugzilla.suse.com/1106195" }, { "category": "self", "summary": "SUSE Bug 1107410", "url": "https://bugzilla.suse.com/1107410" }, { "category": "self", "summary": "SUSE Bug 1107411", "url": "https://bugzilla.suse.com/1107411" }, { "category": "self", "summary": "SUSE Bug 1107412", "url": "https://bugzilla.suse.com/1107412" }, { "category": "self", "summary": "SUSE Bug 1107413", "url": "https://bugzilla.suse.com/1107413" }, { "category": "self", "summary": "SUSE Bug 1107420", "url": "https://bugzilla.suse.com/1107420" }, { "category": "self", "summary": "SUSE Bug 1107421", "url": "https://bugzilla.suse.com/1107421" }, { "category": "self", "summary": "SUSE Bug 1107422", "url": "https://bugzilla.suse.com/1107422" }, { "category": "self", "summary": "SUSE Bug 1107423", "url": "https://bugzilla.suse.com/1107423" }, { "category": "self", "summary": "SUSE Bug 1107426", "url": "https://bugzilla.suse.com/1107426" }, { "category": "self", "summary": "SUSE Bug 1107581", "url": "https://bugzilla.suse.com/1107581" }, { "category": "self", "summary": "SUSE Bug 1108027", "url": "https://bugzilla.suse.com/1108027" }, { "category": "self", "summary": "SUSE Bug 1109105", "url": "https://bugzilla.suse.com/1109105" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15908 page", "url": "https://www.suse.com/security/cve/CVE-2018-15908/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15909 page", "url": "https://www.suse.com/security/cve/CVE-2018-15909/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15910 page", "url": "https://www.suse.com/security/cve/CVE-2018-15910/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15911 page", "url": "https://www.suse.com/security/cve/CVE-2018-15911/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16509 page", "url": "https://www.suse.com/security/cve/CVE-2018-16509/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16510 page", "url": "https://www.suse.com/security/cve/CVE-2018-16510/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16511 page", "url": "https://www.suse.com/security/cve/CVE-2018-16511/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16513 page", "url": "https://www.suse.com/security/cve/CVE-2018-16513/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16539 page", "url": "https://www.suse.com/security/cve/CVE-2018-16539/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16540 page", "url": "https://www.suse.com/security/cve/CVE-2018-16540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16541 page", "url": "https://www.suse.com/security/cve/CVE-2018-16541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16542 page", "url": "https://www.suse.com/security/cve/CVE-2018-16542/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16543 page", "url": "https://www.suse.com/security/cve/CVE-2018-16543/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16585 page", "url": "https://www.suse.com/security/cve/CVE-2018-16585/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16802 page", "url": "https://www.suse.com/security/cve/CVE-2018-16802/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17183 page", "url": "https://www.suse.com/security/cve/CVE-2018-17183/" } ], "title": "Security update for ghostscript", "tracking": { "current_release_date": "2018-10-02T14:51:05Z", "generator": { "date": "2018-10-02T14:51:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2975-1", "initial_release_date": "2018-10-02T14:51:05Z", "revision_history": [ { "date": "2018-10-02T14:51:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-devel-9.25-23.13.1.aarch64", "product": { "name": "ghostscript-devel-9.25-23.13.1.aarch64", "product_id": "ghostscript-devel-9.25-23.13.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-9.25-23.13.1.aarch64", "product": { "name": "ghostscript-9.25-23.13.1.aarch64", "product_id": "ghostscript-9.25-23.13.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-23.13.1.aarch64", "product": { "name": "ghostscript-x11-9.25-23.13.1.aarch64", "product_id": "ghostscript-x11-9.25-23.13.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.25-23.13.1.ppc64le", "product": { "name": "ghostscript-9.25-23.13.1.ppc64le", "product_id": "ghostscript-9.25-23.13.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-23.13.1.ppc64le", "product": { "name": "ghostscript-x11-9.25-23.13.1.ppc64le", "product_id": "ghostscript-x11-9.25-23.13.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-devel-9.25-23.13.1.ppc64le", "product": { "name": "ghostscript-devel-9.25-23.13.1.ppc64le", "product_id": "ghostscript-devel-9.25-23.13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.25-23.13.1.s390x", "product": { "name": "ghostscript-9.25-23.13.1.s390x", "product_id": "ghostscript-9.25-23.13.1.s390x" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-23.13.1.s390x", "product": { "name": "ghostscript-x11-9.25-23.13.1.s390x", "product_id": "ghostscript-x11-9.25-23.13.1.s390x" } }, { "category": "product_version", "name": "ghostscript-devel-9.25-23.13.1.s390x", "product": { "name": "ghostscript-devel-9.25-23.13.1.s390x", "product_id": "ghostscript-devel-9.25-23.13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.25-23.13.1.x86_64", "product": { "name": "ghostscript-9.25-23.13.1.x86_64", "product_id": "ghostscript-9.25-23.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-9.25-23.13.1.x86_64", "product": { "name": "ghostscript-x11-9.25-23.13.1.x86_64", "product_id": "ghostscript-x11-9.25-23.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-devel-9.25-23.13.1.x86_64", "product": { "name": "ghostscript-devel-9.25-23.13.1.x86_64", "product_id": "ghostscript-devel-9.25-23.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-x11-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-x11-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.25-23.13.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64" }, "product_reference": "ghostscript-devel-9.25-23.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-devel-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-devel-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-devel-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-x11-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-x11-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-x11-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-x11-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-x11-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-x11-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64" }, "product_reference": "ghostscript-9.25-23.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-x11-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-x11-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64" }, "product_reference": "ghostscript-9.25-23.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le" }, "product_reference": "ghostscript-x11-9.25-23.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x" }, "product_reference": "ghostscript-x11-9.25-23.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.25-23.13.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.25-23.13.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64" }, "product_reference": "ghostscript-x11-9.25-23.13.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15908" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15908", "url": "https://www.suse.com/security/cve/CVE-2018-15908" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106171 for CVE-2018-15908", "url": "https://bugzilla.suse.com/1106171" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-15908" }, { "cve": "CVE-2018-15909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15909" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15909", "url": "https://www.suse.com/security/cve/CVE-2018-15909" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106172 for CVE-2018-15909", "url": "https://bugzilla.suse.com/1106172" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-15909" }, { "cve": "CVE-2018-15910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15910" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15910", "url": "https://www.suse.com/security/cve/CVE-2018-15910" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106173 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1106173" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-15910" }, { "cve": "CVE-2018-15911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15911" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15911", "url": "https://www.suse.com/security/cve/CVE-2018-15911" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106195 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1106195" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-15911", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-15911" }, { "cve": "CVE-2018-16509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16509" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect \"restoration of privilege\" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16509", "url": "https://www.suse.com/security/cve/CVE-2018-16509" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1118318 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1118318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16509" }, { "cve": "CVE-2018-16510", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16510" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the \"CS\" and \"SC\" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16510", "url": "https://www.suse.com/security/cve/CVE-2018-16510" }, { "category": "external", "summary": "SUSE Bug 1107411 for CVE-2018-16510", "url": "https://bugzilla.suse.com/1107411" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16510" }, { "cve": "CVE-2018-16511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16511" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in \"ztype\" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16511", "url": "https://www.suse.com/security/cve/CVE-2018-16511" }, { "category": "external", "summary": "SUSE Bug 1107426 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1107426" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1112229" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16511" }, { "cve": "CVE-2018-16513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16513" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16513", "url": "https://www.suse.com/security/cve/CVE-2018-16513" }, { "category": "external", "summary": "SUSE Bug 1107412 for CVE-2018-16513", "url": "https://bugzilla.suse.com/1107412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16513" }, { "cve": "CVE-2018-16539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16539" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16539", "url": "https://www.suse.com/security/cve/CVE-2018-16539" }, { "category": "external", "summary": "SUSE Bug 1107422 for CVE-2018-16539", "url": "https://bugzilla.suse.com/1107422" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16539" }, { "cve": "CVE-2018-16540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16540" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16540", "url": "https://www.suse.com/security/cve/CVE-2018-16540" }, { "category": "external", "summary": "SUSE Bug 1107420 for CVE-2018-16540", "url": "https://bugzilla.suse.com/1107420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16540" }, { "cve": "CVE-2018-16541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16541" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16541", "url": "https://www.suse.com/security/cve/CVE-2018-16541" }, { "category": "external", "summary": "SUSE Bug 1107421 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1107421" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16541" }, { "cve": "CVE-2018-16542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16542" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16542", "url": "https://www.suse.com/security/cve/CVE-2018-16542" }, { "category": "external", "summary": "SUSE Bug 1107413 for CVE-2018-16542", "url": "https://bugzilla.suse.com/1107413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16542" }, { "cve": "CVE-2018-16543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16543" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16543", "url": "https://www.suse.com/security/cve/CVE-2018-16543" }, { "category": "external", "summary": "SUSE Bug 1107423 for CVE-2018-16543", "url": "https://bugzilla.suse.com/1107423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16543" }, { "cve": "CVE-2018-16585", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16585" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16585", "url": "https://www.suse.com/security/cve/CVE-2018-16585" }, { "category": "external", "summary": "SUSE Bug 1107581 for CVE-2018-16585", "url": "https://bugzilla.suse.com/1107581" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "low" } ], "title": "CVE-2018-16585" }, { "cve": "CVE-2018-16802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16802" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.25. Incorrect \"restoration of privilege\" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction. This is due to an incomplete fix for CVE-2018-16509.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16802", "url": "https://www.suse.com/security/cve/CVE-2018-16802" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117327 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1117327" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16802", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-16802" }, { "cve": "CVE-2018-17183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17183" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17183", "url": "https://www.suse.com/security/cve/CVE-2018-17183" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1117331 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1117331" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-17183", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ghostscript-9.25-23.13.1.x86_64", "SUSE Enterprise Storage 4:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ghostscript-x11-9.25-23.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:ghostscript-devel-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-9.25-23.13.1.x86_64", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.s390x", "SUSE OpenStack Cloud 7:ghostscript-x11-9.25-23.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-02T14:51:05Z", "details": "moderate" } ], "title": "CVE-2018-17183" } ] }
suse-su-2018:3330-1
Vulnerability from csaf_suse
Published
2018-10-23 12:44
Modified
2018-10-23 12:44
Summary
Security update for ghostscript-library
Notes
Title of the patch
Security update for ghostscript-library
Description of the patch
This update for ghostscript-library fixes the following issues:
- CVE-2018-16511: A type confusion in 'ztype' could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)
- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)
- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)
- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the 'pipe' instruction. (bsc#1107410
- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)
- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)
- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)
Patchnames
sdksp4-ghostscript-library-13830,sleposp3-ghostscript-library-13830,slessp3-ghostscript-library-13830,slessp4-ghostscript-library-13830
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ghostscript-library", "title": "Title of the patch" }, { "category": "description", "text": "This update for ghostscript-library fixes the following issues:\n\n- CVE-2018-16511: A type confusion in \u0027ztype\u0027 could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)\n- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)\n- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)\n- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)\n- CVE-2018-16509: Incorrect \u0027restoration of privilege\u0027 checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the \u0027pipe\u0027 instruction. (bsc#1107410\n- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)\n- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)\n- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-ghostscript-library-13830,sleposp3-ghostscript-library-13830,slessp3-ghostscript-library-13830,slessp4-ghostscript-library-13830", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3330-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3330-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183330-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3330-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" }, { "category": "self", "summary": "SUSE Bug 1050893", "url": "https://bugzilla.suse.com/1050893" }, { "category": "self", "summary": "SUSE Bug 1106173", "url": "https://bugzilla.suse.com/1106173" }, { "category": "self", "summary": "SUSE Bug 1107410", "url": "https://bugzilla.suse.com/1107410" }, { "category": "self", "summary": "SUSE Bug 1107412", "url": "https://bugzilla.suse.com/1107412" }, { "category": "self", "summary": "SUSE Bug 1107413", "url": "https://bugzilla.suse.com/1107413" }, { "category": "self", "summary": "SUSE Bug 1107420", "url": "https://bugzilla.suse.com/1107420" }, { "category": "self", "summary": "SUSE Bug 1107421", "url": "https://bugzilla.suse.com/1107421" }, { "category": "self", "summary": "SUSE Bug 1107426", "url": "https://bugzilla.suse.com/1107426" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9611 page", "url": "https://www.suse.com/security/cve/CVE-2017-9611/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15910 page", "url": "https://www.suse.com/security/cve/CVE-2018-15910/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16509 page", "url": "https://www.suse.com/security/cve/CVE-2018-16509/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16511 page", "url": "https://www.suse.com/security/cve/CVE-2018-16511/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16513 page", "url": "https://www.suse.com/security/cve/CVE-2018-16513/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16540 page", "url": "https://www.suse.com/security/cve/CVE-2018-16540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16541 page", "url": "https://www.suse.com/security/cve/CVE-2018-16541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16542 page", "url": "https://www.suse.com/security/cve/CVE-2018-16542/" } ], "title": "Security update for ghostscript-library", "tracking": { "current_release_date": "2018-10-23T12:44:56Z", "generator": { "date": "2018-10-23T12:44:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3330-1", "initial_release_date": "2018-10-23T12:44:56Z", "revision_history": [ { "date": "2018-10-23T12:44:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-devel-8.62-32.47.13.1.i586", "product": { "name": "ghostscript-devel-8.62-32.47.13.1.i586", "product_id": "ghostscript-devel-8.62-32.47.13.1.i586" } }, { "category": "product_version", "name": "ghostscript-ijs-devel-8.62-32.47.13.1.i586", "product": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.i586", "product_id": "ghostscript-ijs-devel-8.62-32.47.13.1.i586" } }, { "category": "product_version", "name": "libgimpprint-devel-4.2.7-32.47.13.1.i586", "product": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.i586", "product_id": "libgimpprint-devel-4.2.7-32.47.13.1.i586" } }, { "category": "product_version", "name": "ghostscript-fonts-other-8.62-32.47.13.1.i586", "product": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.i586", "product_id": "ghostscript-fonts-other-8.62-32.47.13.1.i586" } }, { "category": "product_version", "name": "ghostscript-fonts-rus-8.62-32.47.13.1.i586", "product": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.i586", "product_id": "ghostscript-fonts-rus-8.62-32.47.13.1.i586" } }, { "category": "product_version", "name": "ghostscript-fonts-std-8.62-32.47.13.1.i586", "product": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.i586", "product_id": "ghostscript-fonts-std-8.62-32.47.13.1.i586" } }, { "category": "product_version", "name": "ghostscript-library-8.62-32.47.13.1.i586", "product": { "name": "ghostscript-library-8.62-32.47.13.1.i586", "product_id": "ghostscript-library-8.62-32.47.13.1.i586" } }, { "category": "product_version", "name": "ghostscript-omni-8.62-32.47.13.1.i586", "product": { "name": "ghostscript-omni-8.62-32.47.13.1.i586", "product_id": "ghostscript-omni-8.62-32.47.13.1.i586" } }, { "category": "product_version", "name": "ghostscript-x11-8.62-32.47.13.1.i586", "product": { "name": "ghostscript-x11-8.62-32.47.13.1.i586", "product_id": "ghostscript-x11-8.62-32.47.13.1.i586" } }, { "category": "product_version", "name": "libgimpprint-4.2.7-32.47.13.1.i586", "product": { "name": "libgimpprint-4.2.7-32.47.13.1.i586", "product_id": "libgimpprint-4.2.7-32.47.13.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ghostscript-devel-8.62-32.47.13.1.ia64", "product": { "name": "ghostscript-devel-8.62-32.47.13.1.ia64", "product_id": "ghostscript-devel-8.62-32.47.13.1.ia64" } }, { "category": "product_version", "name": "ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "product": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "product_id": "ghostscript-ijs-devel-8.62-32.47.13.1.ia64" } }, { "category": "product_version", "name": "libgimpprint-devel-4.2.7-32.47.13.1.ia64", "product": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.ia64", "product_id": "libgimpprint-devel-4.2.7-32.47.13.1.ia64" } }, { "category": "product_version", "name": "ghostscript-fonts-other-8.62-32.47.13.1.ia64", "product": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.ia64", "product_id": "ghostscript-fonts-other-8.62-32.47.13.1.ia64" } }, { "category": "product_version", "name": "ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "product": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "product_id": "ghostscript-fonts-rus-8.62-32.47.13.1.ia64" } }, { "category": "product_version", "name": "ghostscript-fonts-std-8.62-32.47.13.1.ia64", "product": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.ia64", "product_id": "ghostscript-fonts-std-8.62-32.47.13.1.ia64" } }, { "category": "product_version", "name": "ghostscript-library-8.62-32.47.13.1.ia64", "product": { "name": "ghostscript-library-8.62-32.47.13.1.ia64", "product_id": "ghostscript-library-8.62-32.47.13.1.ia64" } }, { "category": "product_version", "name": "ghostscript-omni-8.62-32.47.13.1.ia64", "product": { "name": "ghostscript-omni-8.62-32.47.13.1.ia64", "product_id": "ghostscript-omni-8.62-32.47.13.1.ia64" } }, { "category": "product_version", "name": "ghostscript-x11-8.62-32.47.13.1.ia64", "product": { "name": "ghostscript-x11-8.62-32.47.13.1.ia64", "product_id": "ghostscript-x11-8.62-32.47.13.1.ia64" } }, { "category": "product_version", "name": "libgimpprint-4.2.7-32.47.13.1.ia64", "product": { "name": "libgimpprint-4.2.7-32.47.13.1.ia64", "product_id": "libgimpprint-4.2.7-32.47.13.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-devel-8.62-32.47.13.1.ppc64", "product": { "name": "ghostscript-devel-8.62-32.47.13.1.ppc64", "product_id": "ghostscript-devel-8.62-32.47.13.1.ppc64" } }, { "category": "product_version", "name": "ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "product": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "product_id": "ghostscript-ijs-devel-8.62-32.47.13.1.ppc64" } }, { "category": "product_version", "name": "libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "product": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "product_id": "libgimpprint-devel-4.2.7-32.47.13.1.ppc64" } }, { "category": "product_version", "name": "ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "product": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "product_id": "ghostscript-fonts-other-8.62-32.47.13.1.ppc64" } }, { "category": "product_version", "name": "ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "product": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "product_id": "ghostscript-fonts-rus-8.62-32.47.13.1.ppc64" } }, { "category": "product_version", "name": "ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "product": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "product_id": "ghostscript-fonts-std-8.62-32.47.13.1.ppc64" } }, { "category": "product_version", "name": "ghostscript-library-8.62-32.47.13.1.ppc64", "product": { "name": "ghostscript-library-8.62-32.47.13.1.ppc64", "product_id": "ghostscript-library-8.62-32.47.13.1.ppc64" } }, { "category": "product_version", "name": "ghostscript-omni-8.62-32.47.13.1.ppc64", "product": { "name": "ghostscript-omni-8.62-32.47.13.1.ppc64", "product_id": "ghostscript-omni-8.62-32.47.13.1.ppc64" } }, { "category": "product_version", "name": "ghostscript-x11-8.62-32.47.13.1.ppc64", "product": { "name": "ghostscript-x11-8.62-32.47.13.1.ppc64", "product_id": "ghostscript-x11-8.62-32.47.13.1.ppc64" } }, { "category": "product_version", "name": "libgimpprint-4.2.7-32.47.13.1.ppc64", "product": { "name": "libgimpprint-4.2.7-32.47.13.1.ppc64", "product_id": "libgimpprint-4.2.7-32.47.13.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-devel-8.62-32.47.13.1.s390x", "product": { "name": "ghostscript-devel-8.62-32.47.13.1.s390x", "product_id": "ghostscript-devel-8.62-32.47.13.1.s390x" } }, { "category": "product_version", "name": "ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "product": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "product_id": "ghostscript-ijs-devel-8.62-32.47.13.1.s390x" } }, { "category": "product_version", "name": "libgimpprint-devel-4.2.7-32.47.13.1.s390x", "product": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.s390x", "product_id": "libgimpprint-devel-4.2.7-32.47.13.1.s390x" } }, { "category": "product_version", "name": "ghostscript-fonts-other-8.62-32.47.13.1.s390x", "product": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.s390x", "product_id": "ghostscript-fonts-other-8.62-32.47.13.1.s390x" } }, { "category": "product_version", "name": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "product": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "product_id": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x" } }, { "category": "product_version", "name": "ghostscript-fonts-std-8.62-32.47.13.1.s390x", "product": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.s390x", "product_id": "ghostscript-fonts-std-8.62-32.47.13.1.s390x" } }, { "category": "product_version", "name": "ghostscript-library-8.62-32.47.13.1.s390x", "product": { "name": "ghostscript-library-8.62-32.47.13.1.s390x", "product_id": "ghostscript-library-8.62-32.47.13.1.s390x" } }, { "category": "product_version", "name": "ghostscript-omni-8.62-32.47.13.1.s390x", "product": { "name": "ghostscript-omni-8.62-32.47.13.1.s390x", "product_id": "ghostscript-omni-8.62-32.47.13.1.s390x" } }, { "category": "product_version", "name": "ghostscript-x11-8.62-32.47.13.1.s390x", "product": { "name": "ghostscript-x11-8.62-32.47.13.1.s390x", "product_id": "ghostscript-x11-8.62-32.47.13.1.s390x" } }, { "category": "product_version", "name": "libgimpprint-4.2.7-32.47.13.1.s390x", "product": { "name": "libgimpprint-4.2.7-32.47.13.1.s390x", "product_id": "libgimpprint-4.2.7-32.47.13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ghostscript-devel-8.62-32.47.13.1.x86_64", "product": { "name": "ghostscript-devel-8.62-32.47.13.1.x86_64", "product_id": "ghostscript-devel-8.62-32.47.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "product": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "product_id": "ghostscript-ijs-devel-8.62-32.47.13.1.x86_64" } }, { "category": "product_version", "name": "libgimpprint-devel-4.2.7-32.47.13.1.x86_64", "product": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.x86_64", "product_id": "libgimpprint-devel-4.2.7-32.47.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "product": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "product_id": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "product": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "product_id": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "product": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "product_id": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-library-8.62-32.47.13.1.x86_64", "product": { "name": "ghostscript-library-8.62-32.47.13.1.x86_64", "product_id": "ghostscript-library-8.62-32.47.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-omni-8.62-32.47.13.1.x86_64", "product": { "name": "ghostscript-omni-8.62-32.47.13.1.x86_64", "product_id": "ghostscript-omni-8.62-32.47.13.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-8.62-32.47.13.1.x86_64", "product": { "name": "ghostscript-x11-8.62-32.47.13.1.x86_64", "product_id": "ghostscript-x11-8.62-32.47.13.1.x86_64" } }, { "category": "product_version", "name": "libgimpprint-4.2.7-32.47.13.1.x86_64", "product": { "name": "libgimpprint-4.2.7-32.47.13.1.x86_64", "product_id": "libgimpprint-4.2.7-32.47.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-devel-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-devel-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-devel-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-devel-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-devel-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-ijs-devel-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-ijs-devel-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586" }, "product_reference": "libgimpprint-devel-4.2.7-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64" }, "product_reference": "libgimpprint-devel-4.2.7-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64" }, "product_reference": "libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x" }, "product_reference": "libgimpprint-devel-4.2.7-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-devel-4.2.7-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" }, "product_reference": "libgimpprint-devel-4.2.7-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-library-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-library-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-omni-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-omni-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-8.62-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64" }, "product_reference": "ghostscript-x11-8.62-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgimpprint-4.2.7-32.47.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64" }, "product_reference": "libgimpprint-4.2.7-32.47.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-9611", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9611" } ], "notes": [ { "category": "general", "text": "The Ins_MIRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9611", "url": "https://www.suse.com/security/cve/CVE-2017-9611" }, { "category": "external", "summary": "SUSE Bug 1050893 for CVE-2017-9611", "url": "https://bugzilla.suse.com/1050893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T12:44:56Z", "details": "important" } ], "title": "CVE-2017-9611" }, { "cve": "CVE-2018-15910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15910" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15910", "url": "https://www.suse.com/security/cve/CVE-2018-15910" }, { "category": "external", "summary": "SUSE Bug 1105464 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1105464" }, { "category": "external", "summary": "SUSE Bug 1106173 for CVE-2018-15910", "url": "https://bugzilla.suse.com/1106173" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T12:44:56Z", "details": "moderate" } ], "title": "CVE-2018-15910" }, { "cve": "CVE-2018-16509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16509" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. Incorrect \"restoration of privilege\" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16509", "url": "https://www.suse.com/security/cve/CVE-2018-16509" }, { "category": "external", "summary": "SUSE Bug 1107410 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1107410" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1118318 for CVE-2018-16509", "url": "https://bugzilla.suse.com/1118318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T12:44:56Z", "details": "moderate" } ], "title": "CVE-2018-16509" }, { "cve": "CVE-2018-16511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16511" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in \"ztype\" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16511", "url": "https://www.suse.com/security/cve/CVE-2018-16511" }, { "category": "external", "summary": "SUSE Bug 1107426 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1107426" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16511", "url": "https://bugzilla.suse.com/1112229" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T12:44:56Z", "details": "moderate" } ], "title": "CVE-2018-16511" }, { "cve": "CVE-2018-16513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16513" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16513", "url": "https://www.suse.com/security/cve/CVE-2018-16513" }, { "category": "external", "summary": "SUSE Bug 1107412 for CVE-2018-16513", "url": "https://bugzilla.suse.com/1107412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T12:44:56Z", "details": "moderate" } ], "title": "CVE-2018-16513" }, { "cve": "CVE-2018-16540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16540" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16540", "url": "https://www.suse.com/security/cve/CVE-2018-16540" }, { "category": "external", "summary": "SUSE Bug 1107420 for CVE-2018-16540", "url": "https://bugzilla.suse.com/1107420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T12:44:56Z", "details": "moderate" } ], "title": "CVE-2018-16540" }, { "cve": "CVE-2018-16541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16541" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16541", "url": "https://www.suse.com/security/cve/CVE-2018-16541" }, { "category": "external", "summary": "SUSE Bug 1107421 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1107421" }, { "category": "external", "summary": "SUSE Bug 1108027 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1108027" }, { "category": "external", "summary": "SUSE Bug 1109105 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1109105" }, { "category": "external", "summary": "SUSE Bug 1111479 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111479" }, { "category": "external", "summary": "SUSE Bug 1111480 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1111480" }, { "category": "external", "summary": "SUSE Bug 1112229 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1112229" }, { "category": "external", "summary": "SUSE Bug 1117022 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1117022" }, { "category": "external", "summary": "SUSE Bug 1118455 for CVE-2018-16541", "url": "https://bugzilla.suse.com/1118455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T12:44:56Z", "details": "moderate" } ], "title": "CVE-2018-16541" }, { "cve": "CVE-2018-16542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16542" } ], "notes": [ { "category": "general", "text": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16542", "url": "https://www.suse.com/security/cve/CVE-2018-16542" }, { "category": "external", "summary": "SUSE Bug 1107413 for CVE-2018-16542", "url": "https://bugzilla.suse.com/1107413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-other-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-rus-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-fonts-std-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-library-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-omni-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ghostscript-x11-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgimpprint-4.2.7-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ghostscript-ijs-devel-8.62-32.47.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgimpprint-devel-4.2.7-32.47.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T12:44:56Z", "details": "moderate" } ], "title": "CVE-2018-16542" } ] }
ghsa-m76g-5q68-xv2c
Vulnerability from github
Published
2022-05-14 01:28
Modified
2022-05-14 01:28
Severity ?
VLAI Severity ?
Details
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
{ "affected": [], "aliases": [ "CVE-2018-16541" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-09-05T18:29:00Z", "severity": "MODERATE" }, "details": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "id": "GHSA-m76g-5q68-xv2c", "modified": "2022-05-14T01:28:05Z", "published": "2022-05-14T01:28:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16541" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "type": "WEB", "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699664" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201811-12" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3768-1" }, { "type": "WEB", "url": "https://www.artifex.com/news/ghostscript-security-resolved" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4288" }, { "type": "WEB", "url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2018-16541
Vulnerability from fkie_nvd
Published
2018-09-05 18:29
Modified
2024-11-21 03:52
Severity ?
Summary
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:3834 | Third Party Advisory | |
cve@mitre.org | https://bugs.ghostscript.com/show_bug.cgi?id=699664 | Issue Tracking, Permissions Required, Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201811-12 | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3768-1/ | Third Party Advisory | |
cve@mitre.org | https://www.artifex.com/news/ghostscript-security-resolved/ | Patch, Vendor Advisory | |
cve@mitre.org | https://www.debian.org/security/2018/dsa-4288 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3834 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.ghostscript.com/show_bug.cgi?id=699664 | Issue Tracking, Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201811-12 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3768-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.artifex.com/news/ghostscript-security-resolved/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4288 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
artifex | ghostscript | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_workstation | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "73F68291-86CF-4BF7-A8A3-BFF7A4FDDD13", "versionEndExcluding": "9.24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter." }, { "lang": "es", "value": "En Artifex Ghostscript en versiones anteriores a la 9.24, los atacantes que puedan proporcionar archivos PostScript manipulados podr\u00edan emplear una l\u00f3gica libre incorrecta en el reemplazo pagedevice para provocar el cierre inesperado del int\u00e9rprete." } ], "id": "CVE-2018-16541", "lastModified": "2024-11-21T03:52:56.287", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-05T18:29:00.777", "references": [ { "source": "cve@mitre.org", "url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Permissions Required", "Vendor Advisory" ], "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699664" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201811-12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3768-1/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.artifex.com/news/ghostscript-security-resolved/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=241d91112771a6104de10b3948c3f350d6690c1d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Permissions Required", "Vendor Advisory" ], "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201811-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3768-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.artifex.com/news/ghostscript-security-resolved/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4288" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2018-16541
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-16541", "description": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "id": "GSD-2018-16541", "references": [ "https://www.suse.com/security/cve/CVE-2018-16541.html", "https://www.debian.org/security/2018/dsa-4288", "https://access.redhat.com/errata/RHSA-2018:3834", "https://ubuntu.com/security/CVE-2018-16541", "https://advisories.mageia.org/CVE-2018-16541.html", "https://linux.oracle.com/cve/CVE-2018-16541.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-16541" ], "details": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.", "id": "GSD-2018-16541", "modified": "2023-12-13T01:22:26.331791Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16541", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d", "refsource": "MISC", "url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d" }, { "name": "GLSA-201811-12", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-12" }, { "name": "USN-3768-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3768-1/" }, { "name": "RHSA-2018:3834", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "name": "https://www.artifex.com/news/ghostscript-security-resolved/", "refsource": "MISC", "url": "https://www.artifex.com/news/ghostscript-security-resolved/" }, { "name": "DSA-4288", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4288" }, { "name": "https://bugs.ghostscript.com/show_bug.cgi?id=699664", "refsource": "MISC", "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699664" }, { "name": "[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.24", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16541" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.artifex.com/news/ghostscript-security-resolved/", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.artifex.com/news/ghostscript-security-resolved/" }, { "name": "https://bugs.ghostscript.com/show_bug.cgi?id=699664", "refsource": "MISC", "tags": [ "Issue Tracking", "Permissions Required", "Vendor Advisory" ], "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699664" }, { "name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d" }, { "name": "DSA-4288", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4288" }, { "name": "[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html" }, { "name": "USN-3768-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3768-1/" }, { "name": "GLSA-201811-12", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201811-12" }, { "name": "RHSA-2018:3834", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3834" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2019-03-07T16:06Z", "publishedDate": "2018-09-05T18:29Z" } } }
rhsa-2018:3834
Vulnerability from csaf_redhat
Published
2018-12-17 20:02
Modified
2024-11-22 12:26
Summary
Red Hat Security Advisory: ghostscript security and bug fix update
Notes
Topic
An update for ghostscript is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* ghostscript: Incorrect free logic in pagedevice replacement (699664) (CVE-2018-16541)
* ghostscript: Incorrect "restoration of privilege" checking when running out of stack during exception handling (CVE-2018-16802)
* ghostscript: User-writable error exception table (CVE-2018-17183)
* ghostscript: Saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) (CVE-2018-17961)
* ghostscript: Saved execution stacks can leak operator arrays (CVE-2018-18073)
* ghostscript: 1Policy operator allows a sandbox protection bypass (CVE-2018-18284)
* ghostscript: Type confusion in setpattern (700141) (CVE-2018-19134)
* ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c (CVE-2018-19409)
* ghostscript: Uninitialized memory access in the aesdecode operator (699665) (CVE-2018-15911)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Tavis Ormandy (Google Project Zero) for reporting CVE-2018-16541.
Bug Fix(es):
* It has been found that ghostscript-9.07-31.el7_6.1 introduced regression during the handling of shading objects, causing a "Dropping incorrect smooth shading object" warning. With this update, the regression has been fixed and the described problem no longer occurs. (BZ#1657822)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ghostscript is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.\n\nSecurity Fix(es):\n\n* ghostscript: Incorrect free logic in pagedevice replacement (699664) (CVE-2018-16541)\n\n* ghostscript: Incorrect \"restoration of privilege\" checking when running out of stack during exception handling (CVE-2018-16802)\n\n* ghostscript: User-writable error exception table (CVE-2018-17183)\n\n* ghostscript: Saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) (CVE-2018-17961)\n\n* ghostscript: Saved execution stacks can leak operator arrays (CVE-2018-18073)\n\n* ghostscript: 1Policy operator allows a sandbox protection bypass (CVE-2018-18284)\n\n* ghostscript: Type confusion in setpattern (700141) (CVE-2018-19134)\n\n* ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c (CVE-2018-19409)\n\n* ghostscript: Uninitialized memory access in the aesdecode operator (699665) (CVE-2018-15911)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Tavis Ormandy (Google Project Zero) for reporting CVE-2018-16541.\n\nBug Fix(es):\n\n* It has been found that ghostscript-9.07-31.el7_6.1 introduced regression during the handling of shading objects, causing a \"Dropping incorrect smooth shading object\" warning. With this update, the regression has been fixed and the described problem no longer occurs. (BZ#1657822)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3834", "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1625832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625832" }, { "category": "external", "summary": "1625846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625846" }, { "category": "external", "summary": "1627959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627959" }, { "category": "external", "summary": "1632471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632471" }, { "category": "external", "summary": "1642578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642578" }, { "category": "external", "summary": "1642584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642584" }, { "category": "external", "summary": "1642940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642940" }, { "category": "external", "summary": "1652583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652583" }, { "category": "external", "summary": "1655599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655599" }, { "category": "external", "summary": "1657822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1657822" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3834.json" } ], "title": "Red Hat Security Advisory: ghostscript security and bug fix update", "tracking": { "current_release_date": "2024-11-22T12:26:13+00:00", "generator": { "date": "2024-11-22T12:26:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:3834", "initial_release_date": "2018-12-17T20:02:59+00:00", "revision_history": [ { "date": "2018-12-17T20:02:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-12-17T20:02:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T12:26:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ghostscript-0:9.07-31.el7_6.6.x86_64", "product": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64", "product_id": "ghostscript-0:9.07-31.el7_6.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6.6?arch=x86_64" } } }, { "category": "product_version", "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "product": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "product_id": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-cups@9.07-31.el7_6.6?arch=x86_64" } } }, { "category": "product_version", "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "product": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "product_id": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-debuginfo@9.07-31.el7_6.6?arch=x86_64" } } }, { "category": "product_version", "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "product": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "product_id": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-gtk@9.07-31.el7_6.6?arch=x86_64" } } }, { "category": "product_version", "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "product": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "product_id": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-devel@9.07-31.el7_6.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-0:9.07-31.el7_6.6.i686", "product": { "name": "ghostscript-0:9.07-31.el7_6.6.i686", "product_id": "ghostscript-0:9.07-31.el7_6.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6.6?arch=i686" } } }, { "category": "product_version", "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "product": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "product_id": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-debuginfo@9.07-31.el7_6.6?arch=i686" } } }, { "category": "product_version", "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "product": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "product_id": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-devel@9.07-31.el7_6.6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ghostscript-0:9.07-31.el7_6.6.src", "product": { "name": "ghostscript-0:9.07-31.el7_6.6.src", "product_id": "ghostscript-0:9.07-31.el7_6.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "product": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "product_id": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-gtk@9.07-31.el7_6.6?arch=aarch64" } } }, { "category": "product_version", "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "product": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "product_id": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-debuginfo@9.07-31.el7_6.6?arch=aarch64" } } }, { "category": "product_version", "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "product": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "product_id": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-devel@9.07-31.el7_6.6?arch=aarch64" } } }, { "category": "product_version", "name": "ghostscript-0:9.07-31.el7_6.6.aarch64", "product": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64", "product_id": "ghostscript-0:9.07-31.el7_6.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6.6?arch=aarch64" } } }, { "category": "product_version", "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "product": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "product_id": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-cups@9.07-31.el7_6.6?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "product": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "product_id": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-gtk@9.07-31.el7_6.6?arch=s390x" } } }, { "category": "product_version", "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "product": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "product_id": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-debuginfo@9.07-31.el7_6.6?arch=s390x" } } }, { "category": "product_version", "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "product": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "product_id": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-devel@9.07-31.el7_6.6?arch=s390x" } } }, { "category": "product_version", "name": "ghostscript-0:9.07-31.el7_6.6.s390x", "product": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x", "product_id": "ghostscript-0:9.07-31.el7_6.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6.6?arch=s390x" } } }, { "category": "product_version", "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "product": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "product_id": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-cups@9.07-31.el7_6.6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "product": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "product_id": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-debuginfo@9.07-31.el7_6.6?arch=s390" } } }, { "category": "product_version", "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "product": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "product_id": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-devel@9.07-31.el7_6.6?arch=s390" } } }, { "category": "product_version", "name": "ghostscript-0:9.07-31.el7_6.6.s390", "product": { "name": "ghostscript-0:9.07-31.el7_6.6.s390", "product_id": "ghostscript-0:9.07-31.el7_6.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6.6?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "product": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "product_id": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-gtk@9.07-31.el7_6.6?arch=ppc64le" } } }, { "category": "product_version", "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "product": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "product_id": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-debuginfo@9.07-31.el7_6.6?arch=ppc64le" } } }, { "category": "product_version", "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "product": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "product_id": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-devel@9.07-31.el7_6.6?arch=ppc64le" } } }, { "category": "product_version", "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "product": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "product_id": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6.6?arch=ppc64le" } } }, { "category": "product_version", "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "product": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "product_id": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-cups@9.07-31.el7_6.6?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "product": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "product_id": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-doc@9.07-31.el7_6.6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "product": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "product_id": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-gtk@9.07-31.el7_6.6?arch=ppc64" } } }, { "category": "product_version", "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "product": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "product_id": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-debuginfo@9.07-31.el7_6.6?arch=ppc64" } } }, { "category": "product_version", "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "product": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "product_id": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-devel@9.07-31.el7_6.6?arch=ppc64" } } }, { "category": "product_version", "name": "ghostscript-0:9.07-31.el7_6.6.ppc64", "product": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64", "product_id": "ghostscript-0:9.07-31.el7_6.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6.6?arch=ppc64" } } }, { "category": "product_version", "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "product": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "product_id": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-cups@9.07-31.el7_6.6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "product": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "product_id": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-debuginfo@9.07-31.el7_6.6?arch=ppc" } } }, { "category": "product_version", "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "product": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "product_id": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript-devel@9.07-31.el7_6.6?arch=ppc" } } }, { "category": "product_version", "name": "ghostscript-0:9.07-31.el7_6.6.ppc", "product": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc", "product_id": "ghostscript-0:9.07-31.el7_6.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6.6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.src", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.i686", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-doc-0:9.07-31.el7_6.6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch" }, "product_reference": "ghostscript-doc-0:9.07-31.el7_6.6.noarch", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" }, "product_reference": "ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15911", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2018-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1625832" } ], "notes": [ { "category": "description", "text": "It was discovered that ghostscript did not properly verify the key used in aesdecode. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.", "title": "Vulnerability description" }, { "category": "summary", "text": "ghostscript: Uninitialized memory access in the aesdecode operator (699665)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of ghostscript as shipped with Red Hat Enterprise Linux 5, 6, and 7. \n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-15911" }, { "category": "external", "summary": "RHBZ#1625832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625832" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-15911", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15911" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15911", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15911" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/332928", "url": "https://www.kb.cert.org/vuls/id/332928" } ], "release_date": "2018-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-12-17T20:02:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "category": "workaround", "details": "Please refer to the \"Mitigation\" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ghostscript: Uninitialized memory access in the aesdecode operator (699665)" }, { "acknowledgments": [ { "names": [ "Tavis Ormandy" ], "organization": "Google Project Zero" } ], "cve": "CVE-2018-16541", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1625846" } ], "notes": [ { "category": "description", "text": "It was discovered that the ghostscript device cleanup did not properly handle devices replaced with a null device. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.", "title": "Vulnerability description" }, { "category": "summary", "text": "ghostscript: Incorrect free logic in pagedevice replacement (699664)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ghostscript as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16541" }, { "category": "external", "summary": "RHBZ#1625846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16541", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16541" }, { "category": "external", "summary": "https://www.artifex.com/news/ghostscript-security-resolved/", "url": "https://www.artifex.com/news/ghostscript-security-resolved/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/332928", "url": "https://www.kb.cert.org/vuls/id/332928" } ], "release_date": "2018-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-12-17T20:02:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3834" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ghostscript: Incorrect free logic in pagedevice replacement (699664)" }, { "cve": "CVE-2018-16802", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1627959" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Artifex Ghostscript before 9.25. Incorrect \"restoration of privilege\" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction. This is due to an incomplete fix for CVE-2018-16509.", "title": "Vulnerability description" }, { "category": "summary", "text": "ghostscript: Incorrect \"restoration of privilege\" checking when running out of stack during exception handling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ghostscript as shipped with Red Hat Enterprise Linux 7. This issue did not affect the versions of ghostscript as shipped with Red Hat Enterprise Linux 5 and 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16802" }, { "category": "external", "summary": "RHBZ#1627959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16802", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16802" } ], "release_date": "2018-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-12-17T20:02:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "category": "workaround", "details": "Please refer to the \"Mitigation\" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ghostscript: Incorrect \"restoration of privilege\" checking when running out of stack during exception handling" }, { "cve": "CVE-2018-17183", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632471" } ], "notes": [ { "category": "description", "text": "Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.", "title": "Vulnerability description" }, { "category": "summary", "text": "ghostscript: User-writable error exception table", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17183" }, { "category": "external", "summary": "RHBZ#1632471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17183", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17183" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17183", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17183" } ], "release_date": "2018-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-12-17T20:02:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "category": "workaround", "details": "Please refer to the \"Mitigation\" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ghostscript: User-writable error exception table" }, { "cve": "CVE-2018-17961", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1642578" } ], "notes": [ { "category": "description", "text": "Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.", "title": "Vulnerability description" }, { "category": "summary", "text": "ghostscript: Saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17961" }, { "category": "external", "summary": "RHBZ#1642578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17961", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17961" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17961", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17961" } ], "release_date": "2018-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-12-17T20:02:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "category": "workaround", "details": "Please refer to the \"Mitigation\" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ghostscript: Saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183)" }, { "cve": "CVE-2018-18073", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1642584" } ], "notes": [ { "category": "description", "text": "Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.", "title": "Vulnerability description" }, { "category": "summary", "text": "ghostscript: Saved execution stacks can leak operator arrays", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-18073" }, { "category": "external", "summary": "RHBZ#1642584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18073", "url": "https://www.cve.org/CVERecord?id=CVE-2018-18073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18073" } ], "release_date": "2018-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-12-17T20:02:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "category": "workaround", "details": "Please refer to the \"Mitigation\" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ghostscript: Saved execution stacks can leak operator arrays" }, { "cve": "CVE-2018-18284", "discovery_date": "2018-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1642940" } ], "notes": [ { "category": "description", "text": "Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.", "title": "Vulnerability description" }, { "category": "summary", "text": "ghostscript: 1Policy operator allows a sandbox protection bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-18284" }, { "category": "external", "summary": "RHBZ#1642940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642940" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18284", "url": "https://www.cve.org/CVERecord?id=CVE-2018-18284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18284" } ], "release_date": "2018-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-12-17T20:02:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "category": "workaround", "details": "Please refer to the \"Mitigation\" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ghostscript: 1Policy operator allows a sandbox protection bypass" }, { "cve": "CVE-2018-19134", "discovery_date": "2018-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655599" } ], "notes": [ { "category": "description", "text": "In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type.", "title": "Vulnerability description" }, { "category": "summary", "text": "ghostscript: Type confusion in setpattern (700141)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19134" }, { "category": "external", "summary": "RHBZ#1655599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655599" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19134", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19134" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19134", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19134" } ], "release_date": "2018-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-12-17T20:02:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "category": "workaround", "details": "Please refer to the \"Mitigation\" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ghostscript: Type confusion in setpattern (700141)" }, { "cve": "CVE-2018-19409", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1652583" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.", "title": "Vulnerability description" }, { "category": "summary", "text": "ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19409" }, { "category": "external", "summary": "RHBZ#1652583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19409", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19409" } ], "release_date": "2018-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-12-17T20:02:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3834" }, { "category": "workaround", "details": "Please refer to the \"Mitigation\" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509", "product_ids": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Client-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Client-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Client-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7ComputeNode-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7ComputeNode-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7ComputeNode-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Server-optional-Alt-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Server-optional-Alt-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Server-optional-Alt-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.src", "7Workstation-optional-7.6.Z:ghostscript-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-cups-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-debuginfo-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.i686", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-devel-0:9.07-31.el7_6.6.x86_64", "7Workstation-optional-7.6.Z:ghostscript-doc-0:9.07-31.el7_6.6.noarch", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.aarch64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.ppc64le", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.s390x", "7Workstation-optional-7.6.Z:ghostscript-gtk-0:9.07-31.el7_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…