Описание
Security update for ghostscript
This update for ghostscript fixes the following issues:
- CVE-2024-29510: Fixed an arbitrary path traversal when running in a permitted path (bsc#1226945).
- CVE-2024-33870: Fixed a format string injection that could lead to command execution (bsc#1226944).
- CVE-2024-33869: Fixed a path validation bypass that could lead to path traversal (bsc#1226946).
Список пакетов
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
SUSE Linux Enterprise Module for Basesystem 15 SP5
SUSE Linux Enterprise Module for Basesystem 15 SP6
SUSE Linux Enterprise Server 15 SP2-LTSS
SUSE Linux Enterprise Server 15 SP3-LTSS
SUSE Linux Enterprise Server 15 SP4-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP2
SUSE Linux Enterprise Server for SAP Applications 15 SP3
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Manager Proxy 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.5
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2024:2292-1
- E-Mail link for SUSE-SU-2024:2292-1
- SUSE Security Ratings
- SUSE Bug 1226944
- SUSE Bug 1226945
- SUSE Bug 1226946
- SUSE CVE CVE-2024-29510 page
- SUSE CVE CVE-2024-33869 page
- SUSE CVE CVE-2024-33870 page
Описание
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
Затронутые продукты
Ссылки
- CVE-2024-29510
- SUSE Bug 1226945
Описание
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
Затронутые продукты
Ссылки
- CVE-2024-33869
- SUSE Bug 1226946
Описание
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
Затронутые продукты
Ссылки
- CVE-2024-33870
- SUSE Bug 1226944