ghostscript-tools-dvipdf vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ghostscript-tools-dvipdf package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Uninitialized Pointer

*
  • M
Buffer Overflow

*
  • M
Directory Traversal

*
  • M
Out-of-bounds Read

*
  • M
Directory Traversal

<0:9.54.0-12.el9_2.2
  • M
Directory Traversal

<0:9.54.0-12.el9_2.2
  • M
Improper Input Validation

<0:9.54.0-12.el9_2.2
  • M
Directory Traversal

<0:9.54.0-12.el9_2.2
  • M
Directory Traversal

<0:9.54.0-12.el9_2.2
  • M
Improper Input Validation

<0:9.54.0-12.el9_2.2
  • M
Directory Traversal

<0:9.54.0-12.el9_2.2
  • M
Directory Traversal

<0:9.54.0-12.el9_2.2
  • M
Improper Input Validation

<0:9.54.0-12.el9_2.2
  • M
Directory Traversal

<0:9.54.0-17.el9_4
  • M
Directory Traversal

<0:9.54.0-17.el9_4
  • M
Improper Input Validation

<0:9.54.0-17.el9_4
  • H
Improper Input Validation

<0:9.54.0-16.el9_4
  • M
Out-of-bounds Read

<0:9.54.0-13.el9
  • M
Out-of-bounds Write

<0:9.54.0-13.el9
  • H
OS Command Injection

<0:9.54.0-10.el9_2
  • H
Arbitrary Code Injection

<0:9.54.0-14.el9_3
  • H
Improper Input Validation

<0:9.54.0-12.el9_2.1
  • H
Improper Input Validation

<0:9.54.0-12.el9_2.1
  • H
Improper Input Validation

<0:9.54.0-12.el9_2.1
  • M
Memory Leak

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Directory Traversal

<0:9.54.0-17.el9_4
  • M
Directory Traversal

<0:9.54.0-17.el9_4
  • M
Improper Input Validation

<0:9.54.0-17.el9_4
  • H
Improper Input Validation

<0:9.54.0-7.el9_0.3
  • H
Improper Input Validation

<0:9.54.0-16.el9_4
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Use After Free

*
  • H
Arbitrary Code Injection

<0:9.54.0-11.el9_2
  • H
Arbitrary Code Injection

<0:9.54.0-11.el9_2
  • H
Arbitrary Code Injection

<0:9.54.0-14.el9_3
  • H
Arbitrary Code Injection

<0:9.54.0-11.el9_2
  • H
Arbitrary Code Injection

<0:9.54.0-7.el9_0.2
  • H
Arbitrary Code Injection

<0:9.54.0-7.el9_0.2
  • L
Divide By Zero

*
  • M
Out-of-bounds Read

<0:9.54.0-13.el9
  • H
OS Command Injection

<0:9.54.0-10.el9_2
  • H
OS Command Injection

<0:9.54.0-10.el9_2
  • H
OS Command Injection

<0:9.54.0-7.el9_0.1
  • H
OS Command Injection

<0:9.54.0-10.el9_2
  • H
OS Command Injection

<0:9.54.0-7.el9_0.1
  • H
OS Command Injection

<0:9.54.0-10.el9_2
  • M
Out-of-bounds Write

<0:9.54.0-13.el9
  • M
Improper Use of Validation Framework

*