ghostscript-9.54.0-17.el9_4
エラータID: AXSA:2024-8750:04
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* ghostscript: format string injection leads to shell command execution (SAFER bypass) (CVE-2024-29510)
* ghostscript: path traversal and command execution due to path reduction (CVE-2024-33869)
* ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths (CVE-2024-33870)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-29510
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
CVE-2024-33869
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
CVE-2024-33870
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
Update packages.
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
N/A
SRPMS
- ghostscript-9.54.0-17.el9_4.src.rpm
MD5: 2de96cab7c68e05c85b67084566e29df
SHA-256: c5c060e116e80b410a1ce315f0a33dd86af5a64abe0af61becc296bef0499495
Size: 53.47 MB
Asianux Server 9 for x86_64
- ghostscript-9.54.0-17.el9_4.i686.rpm
MD5: a8f397fa8c587ff9e18e4ab6e3441903
SHA-256: 9ff92260085051764981b95315a789b6009c81bd364b59bbbdcdd776b20a0cc5
Size: 44.19 kB - ghostscript-9.54.0-17.el9_4.x86_64.rpm
MD5: 700ff6b22fefeaaa21e687dc562a3170
SHA-256: bf4456b4ed4d282fe540f626867dee66c0f22d165d626825ef3df56141eaa395
Size: 44.01 kB - ghostscript-doc-9.54.0-17.el9_4.noarch.rpm
MD5: bbd04f7b25f2d4537bc860179020dd8c
SHA-256: 2df47d6502157f4d4d9f0103279520c5c85a4eab6bea4077660b8d16a77d5f62
Size: 7.78 MB - ghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpm
MD5: 8bf600f65997be05c0b674bf0a089ce5
SHA-256: 4497da5ca54a3b663444b99059ec30476d29c2faad60d7c96cfbef3ed8b28704
Size: 10.58 kB - ghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpm
MD5: 0de3d4d7d54b078587668db048970561
SHA-256: 9098193db55e5f8aab2ca530baa1d6acc25f68535c07aa8b47093bbc5eeddf81
Size: 11.59 kB - ghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpm
MD5: ff8b8c81e98dba1fcf53ff71f606f440
SHA-256: cd1d784107e57e5f76d07dc2d6c46f0702a6024bbc62a909bf7399abb6d78321
Size: 11.56 kB - ghostscript-tools-printing-9.54.0-17.el9_4.i686.rpm
MD5: 68a3fc4dd5afe57f1c000bccc46ca3dd
SHA-256: 8ef19592f2147a75b3b9aa1906cdf9cf027de751b949b4a67a73ea07673f64d6
Size: 11.57 kB - ghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpm
MD5: 331b349e4ec6a522591389abf2d1ceea
SHA-256: 5f5ad18f8c5ef4129b5f905fba4107d26927c61808fd4ebea1d15f51257bfff0
Size: 11.54 kB - ghostscript-x11-9.54.0-17.el9_4.x86_64.rpm
MD5: 5ddf2514063d715cf85b873721654e9f
SHA-256: 8cc0ae9606c5059b7e07f8b08161ce8389da6f05f4e55259a4f53d7219d1b5b7
Size: 37.79 kB - libgs-9.54.0-17.el9_4.i686.rpm
MD5: 389f9c9a015f126b2996a83335fc1548
SHA-256: 764d1ecf72f21a157014234492ab0b050762f20faceceb581006b9112d965e11
Size: 3.33 MB - libgs-9.54.0-17.el9_4.x86_64.rpm
MD5: 07282869ddb96feb5ffc134a03fe95a1
SHA-256: 36177c4c971edb17af1c55d5b49255331fc6f043cb5e873c767e34c4184e1f75
Size: 3.16 MB - libgs-devel-9.54.0-17.el9_4.i686.rpm
MD5: 1e558159be2892d5bdb2af2cecea01af
SHA-256: aab7ae8bee9f90824ad297fd9cfa7ff5feebce250fba883a916e19f35f352279
Size: 20.75 kB - libgs-devel-9.54.0-17.el9_4.x86_64.rpm
MD5: 9b2682107c265f78bf1e61666e696989
SHA-256: 14bac15fb2826cb735006a5b18b39ded09b1fb8f6fdf50ac370de89cbc76043b
Size: 20.72 kB