Vulnerabilities affecting this package (0)
| Vulnerability |
Summary |
Fixed by |
|
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (5)
| Vulnerability |
Summary |
Aliases |
|
VCID-2ej9-sjne-9ycq
|
gv 3.5.8, and possibly earlier versions, allows remote attackers to execute arbitrary commands via shell metacharacters in the filename for (1) a PDF file or (2) a gzip file.
|
CVE-2002-1569
|
|
VCID-nbvn-md4g-27cv
|
This GLSA contains notification of vulnerabilities found in several
Gentoo packages which have been fixed prior to January 1, 2011. The worst
of these vulnerabilities could lead to local privilege escalation and
remote code execution. Please see the package list and CVE identifiers
below for more information.
|
CVE-2010-2056
|
|
VCID-vws2-991u-bycg
|
GNU gv improperly handles user-supplied data possibly allowing for the
execution of arbitrary code.
|
CVE-2006-5864
|
|
VCID-vygn-7965-vfdm
|
Multiple buffer overflows in the psscan function in ps.c for gv (ghostview) allow remote attackers to execute arbitrary code via a Postscript file with a long (1) BoundingBox, (2) comment, (3) Orientation, (4) PageOrder, or (5) Pages value.
|
CVE-2004-1717
|
|
VCID-wkcq-2876-jbd4
|
security flaw
|
CVE-2002-0838
|