Описание
Security update for ghostscript
This update for ghostscript fixes the following issues:
- CVE-2024-29510: Fixed an arbitrary path traversal when running in a permitted path (bsc#1226945).
- CVE-2024-33870: Fixed a format string injection that could lead to command execution (bsc#1226944).
- CVE-2024-33869: Fixed a path validation bypass that could lead to path traversal (bsc#1226946).
Список пакетов
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
SUSE Linux Enterprise Software Development Kit 12 SP5
Ссылки
- Link for SUSE-SU-2024:2276-1
- E-Mail link for SUSE-SU-2024:2276-1
- SUSE Security Ratings
- SUSE Bug 1226944
- SUSE Bug 1226945
- SUSE Bug 1226946
- SUSE CVE CVE-2024-29510 page
- SUSE CVE CVE-2024-33869 page
- SUSE CVE CVE-2024-33870 page
Описание
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
Затронутые продукты
Ссылки
- CVE-2024-29510
- SUSE Bug 1226945
Описание
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
Затронутые продукты
Ссылки
- CVE-2024-33869
- SUSE Bug 1226946
Описание
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
Затронутые продукты
Ссылки
- CVE-2024-33870
- SUSE Bug 1226944