Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-52722 (GCVE-0-2023-52722)
Vulnerability from cvelistv5
Published
2024-04-27 00:00
Modified
2024-12-04 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52722", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-29T19:14:51.635054Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T21:03:25.395Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1" }, { "name": "[oss-security] 20240628 Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code execution", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/06/28/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-03T18:49:41.423299", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1" }, { "name": "[oss-security] 20240628 Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code execution", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2024/06/28/2" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-52722", "datePublished": "2024-04-27T00:00:00", "dateReserved": "2024-04-27T00:00:00", "dateUpdated": "2024-12-04T21:03:25.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-52722\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-04-28T00:15:07.270\",\"lastModified\":\"2025-06-23T18:35:47.363\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 un problema en Artifex Ghostscript hasta la versi\u00f3n 10.01.0. psi/zmisc1.c, cuando se utiliza el modo M\u00c1S SEGURO, permite semillas eexec distintas al est\u00e1ndar Tipo 1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.03.1\",\"matchCriteriaId\":\"62DFF97A-B408-4992-940C-5AEAFCB69A99\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2024/06/28/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/06/28/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/28/2\", \"name\": \"[oss-security] 20240628 Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code execution\", \"tags\": [\"mailing-list\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T23:11:35.806Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-52722\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-29T19:14:51.635054Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-29T19:15:06.409Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/28/2\", \"name\": \"[oss-security] 20240628 Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code execution\", \"tags\": [\"mailing-list\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-07-03T18:49:41.423299\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-52722\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-04T21:03:25.395Z\", \"dateReserved\": \"2024-04-27T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-04-27T00:00:00\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-5473-w6gq-5r5g
Vulnerability from github
Published
2024-04-28 00:30
Modified
2024-12-04 21:30
Severity ?
VLAI Severity ?
Details
An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
{ "affected": [], "aliases": [ "CVE-2023-52722" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-04-28T00:15:07Z", "severity": "MODERATE" }, "details": "An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.", "id": "GHSA-5473-w6gq-5r5g", "modified": "2024-12-04T21:30:51Z", "published": "2024-04-28T00:30:23Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52722" }, { "type": "WEB", "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/06/28/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ] }
fkie_cve-2023-52722
Vulnerability from fkie_nvd
Published
2024-04-28 00:15
Modified
2025-06-23 18:35
Severity ?
Summary
An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2024/06/28/2 | Mailing List | |
cve@mitre.org | https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/06/28/2 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1 | Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
artifex | ghostscript | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "62DFF97A-B408-4992-940C-5AEAFCB69A99", "versionEndExcluding": "10.03.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Artifex Ghostscript hasta la versi\u00f3n 10.01.0. psi/zmisc1.c, cuando se utiliza el modo M\u00c1S SEGURO, permite semillas eexec distintas al est\u00e1ndar Tipo 1." } ], "id": "CVE-2023-52722", "lastModified": "2025-06-23T18:35:47.363", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-04-28T00:15:07.270", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/06/28/2" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/06/28/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2024:1590-1
Vulnerability from csaf_suse
Published
2024-05-10 07:19
Modified
2024-05-10 07:19
Summary
Security update for ghostscript
Notes
Title of the patch
Security update for ghostscript
Description of the patch
This update for ghostscript fixes the following issues:
- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).
Patchnames
SUSE-2024-1590,SUSE-SLE-Module-Basesystem-15-SP5-2024-1590,openSUSE-SLE-15.5-2024-1590
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ghostscript", "title": "Title of the patch" }, { "category": "description", "text": "This update for ghostscript fixes the following issues:\n\n- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-1590,SUSE-SLE-Module-Basesystem-15-SP5-2024-1590,openSUSE-SLE-15.5-2024-1590", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1590-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:1590-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241590-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:1590-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018501.html" }, { "category": "self", "summary": "SUSE Bug 1223852", "url": "https://bugzilla.suse.com/1223852" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52722 page", "url": "https://www.suse.com/security/cve/CVE-2023-52722/" } ], "title": "Security update for ghostscript", "tracking": { "current_release_date": "2024-05-10T07:19:33Z", "generator": { "date": "2024-05-10T07:19:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:1590-1", "initial_release_date": "2024-05-10T07:19:33Z", "revision_history": [ { "date": "2024-05-10T07:19:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-9.52-150000.188.1.aarch64", "product_id": "ghostscript-9.52-150000.188.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-devel-9.52-150000.188.1.aarch64", "product_id": "ghostscript-devel-9.52-150000.188.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-mini-9.52-150000.188.1.aarch64", "product_id": "ghostscript-mini-9.52-150000.188.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.aarch64", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-x11-9.52-150000.188.1.aarch64", "product_id": "ghostscript-x11-9.52-150000.188.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.i586", "product": { "name": "ghostscript-9.52-150000.188.1.i586", "product_id": "ghostscript-9.52-150000.188.1.i586" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.i586", "product": { "name": "ghostscript-devel-9.52-150000.188.1.i586", "product_id": "ghostscript-devel-9.52-150000.188.1.i586" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.i586", "product": { "name": "ghostscript-mini-9.52-150000.188.1.i586", "product_id": "ghostscript-mini-9.52-150000.188.1.i586" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.i586", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.i586", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.i586" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.i586", "product": { "name": "ghostscript-x11-9.52-150000.188.1.i586", "product_id": "ghostscript-x11-9.52-150000.188.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-9.52-150000.188.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-devel-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-devel-9.52-150000.188.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-mini-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-mini-9.52-150000.188.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-x11-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-x11-9.52-150000.188.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-9.52-150000.188.1.s390x", "product_id": "ghostscript-9.52-150000.188.1.s390x" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-devel-9.52-150000.188.1.s390x", "product_id": "ghostscript-devel-9.52-150000.188.1.s390x" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-mini-9.52-150000.188.1.s390x", "product_id": "ghostscript-mini-9.52-150000.188.1.s390x" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.s390x", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.s390x" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-x11-9.52-150000.188.1.s390x", "product_id": "ghostscript-x11-9.52-150000.188.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-9.52-150000.188.1.x86_64", "product_id": "ghostscript-9.52-150000.188.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-devel-9.52-150000.188.1.x86_64", "product_id": "ghostscript-devel-9.52-150000.188.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-mini-9.52-150000.188.1.x86_64", "product_id": "ghostscript-mini-9.52-150000.188.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.x86_64", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-x11-9.52-150000.188.1.x86_64", "product_id": "ghostscript-x11-9.52-150000.188.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-9.52-150000.188.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-9.52-150000.188.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-9.52-150000.188.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-9.52-150000.188.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-9.52-150000.188.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-9.52-150000.188.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52722" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.x86_64", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.aarch64", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.s390x", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.x86_64", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.aarch64", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.s390x", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.x86_64", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.aarch64", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.s390x", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52722", "url": "https://www.suse.com/security/cve/CVE-2023-52722" }, { "category": "external", "summary": "SUSE Bug 1223852 for CVE-2023-52722", "url": "https://bugzilla.suse.com/1223852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.x86_64", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.aarch64", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.s390x", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.x86_64", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.aarch64", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.s390x", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.x86_64", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.aarch64", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.s390x", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.x86_64", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.aarch64", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.s390x", "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.x86_64", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.aarch64", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.s390x", "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.x86_64", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.aarch64", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.s390x", "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-10T07:19:33Z", "details": "moderate" } ], "title": "CVE-2023-52722" } ] }
suse-su-2024:1568-1
Vulnerability from csaf_suse
Published
2024-05-09 11:17
Modified
2024-05-09 11:17
Summary
Security update for ghostscript
Notes
Title of the patch
Security update for ghostscript
Description of the patch
This update for ghostscript fixes the following issues:
- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).
Patchnames
SUSE-2024-1568,SUSE-SLE-SDK-12-SP5-2024-1568,SUSE-SLE-SERVER-12-SP5-2024-1568
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ghostscript", "title": "Title of the patch" }, { "category": "description", "text": "This update for ghostscript fixes the following issues:\n\n- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-1568,SUSE-SLE-SDK-12-SP5-2024-1568,SUSE-SLE-SERVER-12-SP5-2024-1568", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1568-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:1568-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241568-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:1568-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-May/035209.html" }, { "category": "self", "summary": "SUSE Bug 1223852", "url": "https://bugzilla.suse.com/1223852" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52722 page", "url": "https://www.suse.com/security/cve/CVE-2023-52722/" } ], "title": "Security update for ghostscript", "tracking": { "current_release_date": "2024-05-09T11:17:16Z", "generator": { "date": "2024-05-09T11:17:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:1568-1", "initial_release_date": "2024-05-09T11:17:16Z", "revision_history": [ { "date": "2024-05-09T11:17:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-23.74.1.aarch64", "product": { "name": "ghostscript-9.52-23.74.1.aarch64", "product_id": "ghostscript-9.52-23.74.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-23.74.1.aarch64", "product": { "name": "ghostscript-devel-9.52-23.74.1.aarch64", "product_id": "ghostscript-devel-9.52-23.74.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-23.74.1.aarch64", "product": { "name": "ghostscript-mini-9.52-23.74.1.aarch64", "product_id": "ghostscript-mini-9.52-23.74.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-23.74.1.aarch64", "product": { "name": "ghostscript-mini-devel-9.52-23.74.1.aarch64", "product_id": "ghostscript-mini-devel-9.52-23.74.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-23.74.1.aarch64", "product": { "name": "ghostscript-x11-9.52-23.74.1.aarch64", "product_id": "ghostscript-x11-9.52-23.74.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-23.74.1.i586", "product": { "name": "ghostscript-9.52-23.74.1.i586", "product_id": "ghostscript-9.52-23.74.1.i586" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-23.74.1.i586", "product": { "name": "ghostscript-devel-9.52-23.74.1.i586", "product_id": "ghostscript-devel-9.52-23.74.1.i586" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-23.74.1.i586", "product": { "name": "ghostscript-mini-9.52-23.74.1.i586", "product_id": "ghostscript-mini-9.52-23.74.1.i586" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-23.74.1.i586", "product": { "name": "ghostscript-mini-devel-9.52-23.74.1.i586", "product_id": "ghostscript-mini-devel-9.52-23.74.1.i586" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-23.74.1.i586", "product": { "name": "ghostscript-x11-9.52-23.74.1.i586", "product_id": "ghostscript-x11-9.52-23.74.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-23.74.1.ppc64le", "product": { "name": "ghostscript-9.52-23.74.1.ppc64le", "product_id": "ghostscript-9.52-23.74.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-23.74.1.ppc64le", "product": { "name": "ghostscript-devel-9.52-23.74.1.ppc64le", "product_id": "ghostscript-devel-9.52-23.74.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-23.74.1.ppc64le", "product": { "name": "ghostscript-mini-9.52-23.74.1.ppc64le", "product_id": "ghostscript-mini-9.52-23.74.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-23.74.1.ppc64le", "product": { "name": "ghostscript-mini-devel-9.52-23.74.1.ppc64le", "product_id": "ghostscript-mini-devel-9.52-23.74.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-23.74.1.ppc64le", "product": { "name": "ghostscript-x11-9.52-23.74.1.ppc64le", "product_id": "ghostscript-x11-9.52-23.74.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-23.74.1.s390", "product": { "name": "ghostscript-9.52-23.74.1.s390", "product_id": "ghostscript-9.52-23.74.1.s390" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-23.74.1.s390", "product": { "name": "ghostscript-devel-9.52-23.74.1.s390", "product_id": "ghostscript-devel-9.52-23.74.1.s390" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-23.74.1.s390", "product": { "name": "ghostscript-mini-9.52-23.74.1.s390", "product_id": "ghostscript-mini-9.52-23.74.1.s390" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-23.74.1.s390", "product": { "name": "ghostscript-mini-devel-9.52-23.74.1.s390", "product_id": "ghostscript-mini-devel-9.52-23.74.1.s390" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-23.74.1.s390", "product": { "name": "ghostscript-x11-9.52-23.74.1.s390", "product_id": "ghostscript-x11-9.52-23.74.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-23.74.1.s390x", "product": { "name": "ghostscript-9.52-23.74.1.s390x", "product_id": "ghostscript-9.52-23.74.1.s390x" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-23.74.1.s390x", "product": { "name": "ghostscript-devel-9.52-23.74.1.s390x", "product_id": "ghostscript-devel-9.52-23.74.1.s390x" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-23.74.1.s390x", "product": { "name": "ghostscript-mini-9.52-23.74.1.s390x", "product_id": "ghostscript-mini-9.52-23.74.1.s390x" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-23.74.1.s390x", "product": { "name": "ghostscript-mini-devel-9.52-23.74.1.s390x", "product_id": "ghostscript-mini-devel-9.52-23.74.1.s390x" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-23.74.1.s390x", "product": { "name": "ghostscript-x11-9.52-23.74.1.s390x", "product_id": "ghostscript-x11-9.52-23.74.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-23.74.1.x86_64", "product": { "name": "ghostscript-9.52-23.74.1.x86_64", "product_id": "ghostscript-9.52-23.74.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-23.74.1.x86_64", "product": { "name": "ghostscript-devel-9.52-23.74.1.x86_64", "product_id": "ghostscript-devel-9.52-23.74.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-23.74.1.x86_64", "product": { "name": "ghostscript-mini-9.52-23.74.1.x86_64", "product_id": "ghostscript-mini-9.52-23.74.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-23.74.1.x86_64", "product": { "name": "ghostscript-mini-devel-9.52-23.74.1.x86_64", "product_id": "ghostscript-mini-devel-9.52-23.74.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-23.74.1.x86_64", "product": { "name": "ghostscript-x11-9.52-23.74.1.x86_64", "product_id": "ghostscript-x11-9.52-23.74.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64" }, "product_reference": "ghostscript-devel-9.52-23.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le" }, "product_reference": "ghostscript-devel-9.52-23.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.s390x" }, "product_reference": "ghostscript-devel-9.52-23.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64" }, "product_reference": "ghostscript-devel-9.52-23.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.aarch64" }, "product_reference": "ghostscript-9.52-23.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.ppc64le" }, "product_reference": "ghostscript-9.52-23.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.s390x" }, "product_reference": "ghostscript-9.52-23.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.x86_64" }, "product_reference": "ghostscript-9.52-23.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64" }, "product_reference": "ghostscript-devel-9.52-23.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le" }, "product_reference": "ghostscript-devel-9.52-23.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.s390x" }, "product_reference": "ghostscript-devel-9.52-23.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64" }, "product_reference": "ghostscript-devel-9.52-23.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64" }, "product_reference": "ghostscript-x11-9.52-23.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le" }, "product_reference": "ghostscript-x11-9.52-23.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.s390x" }, "product_reference": "ghostscript-x11-9.52-23.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64" }, "product_reference": "ghostscript-x11-9.52-23.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.aarch64" }, "product_reference": "ghostscript-9.52-23.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.ppc64le" }, "product_reference": "ghostscript-9.52-23.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.s390x" }, "product_reference": "ghostscript-9.52-23.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.x86_64" }, "product_reference": "ghostscript-9.52-23.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64" }, "product_reference": "ghostscript-devel-9.52-23.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le" }, "product_reference": "ghostscript-devel-9.52-23.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.s390x" }, "product_reference": "ghostscript-devel-9.52-23.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64" }, "product_reference": "ghostscript-devel-9.52-23.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64" }, "product_reference": "ghostscript-x11-9.52-23.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le" }, "product_reference": "ghostscript-x11-9.52-23.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.s390x" }, "product_reference": "ghostscript-x11-9.52-23.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64" }, "product_reference": "ghostscript-x11-9.52-23.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52722" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52722", "url": "https://www.suse.com/security/cve/CVE-2023-52722" }, { "category": "external", "summary": "SUSE Bug 1223852 for CVE-2023-52722", "url": "https://bugzilla.suse.com/1223852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-09T11:17:16Z", "details": "moderate" } ], "title": "CVE-2023-52722" } ] }
suse-su-2024:1590-2
Vulnerability from csaf_suse
Published
2024-06-18 11:06
Modified
2024-06-18 11:06
Summary
Security update for ghostscript
Notes
Title of the patch
Security update for ghostscript
Description of the patch
This update for ghostscript fixes the following issues:
- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).
Patchnames
SUSE-2024-1590,SUSE-SLE-Module-Basesystem-15-SP6-2024-1590,openSUSE-SLE-15.6-2024-1590
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ghostscript", "title": "Title of the patch" }, { "category": "description", "text": "This update for ghostscript fixes the following issues:\n\n- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-1590,SUSE-SLE-Module-Basesystem-15-SP6-2024-1590,openSUSE-SLE-15.6-2024-1590", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1590-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:1590-2", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241590-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:1590-2", "url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035623.html" }, { "category": "self", "summary": "SUSE Bug 1223852", "url": "https://bugzilla.suse.com/1223852" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52722 page", "url": "https://www.suse.com/security/cve/CVE-2023-52722/" } ], "title": "Security update for ghostscript", "tracking": { "current_release_date": "2024-06-18T11:06:19Z", "generator": { "date": "2024-06-18T11:06:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:1590-2", "initial_release_date": "2024-06-18T11:06:19Z", "revision_history": [ { "date": "2024-06-18T11:06:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-9.52-150000.188.1.aarch64", "product_id": "ghostscript-9.52-150000.188.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-devel-9.52-150000.188.1.aarch64", "product_id": "ghostscript-devel-9.52-150000.188.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-mini-9.52-150000.188.1.aarch64", "product_id": "ghostscript-mini-9.52-150000.188.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.aarch64", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.aarch64", "product": { "name": "ghostscript-x11-9.52-150000.188.1.aarch64", "product_id": "ghostscript-x11-9.52-150000.188.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.i586", "product": { "name": "ghostscript-9.52-150000.188.1.i586", "product_id": "ghostscript-9.52-150000.188.1.i586" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.i586", "product": { "name": "ghostscript-devel-9.52-150000.188.1.i586", "product_id": "ghostscript-devel-9.52-150000.188.1.i586" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.i586", "product": { "name": "ghostscript-mini-9.52-150000.188.1.i586", "product_id": "ghostscript-mini-9.52-150000.188.1.i586" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.i586", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.i586", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.i586" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.i586", "product": { "name": "ghostscript-x11-9.52-150000.188.1.i586", "product_id": "ghostscript-x11-9.52-150000.188.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-9.52-150000.188.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-devel-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-devel-9.52-150000.188.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-mini-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-mini-9.52-150000.188.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.ppc64le", "product": { "name": "ghostscript-x11-9.52-150000.188.1.ppc64le", "product_id": "ghostscript-x11-9.52-150000.188.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-9.52-150000.188.1.s390x", "product_id": "ghostscript-9.52-150000.188.1.s390x" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-devel-9.52-150000.188.1.s390x", "product_id": "ghostscript-devel-9.52-150000.188.1.s390x" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-mini-9.52-150000.188.1.s390x", "product_id": "ghostscript-mini-9.52-150000.188.1.s390x" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.s390x", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.s390x" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.s390x", "product": { "name": "ghostscript-x11-9.52-150000.188.1.s390x", "product_id": "ghostscript-x11-9.52-150000.188.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ghostscript-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-9.52-150000.188.1.x86_64", "product_id": "ghostscript-9.52-150000.188.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-devel-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-devel-9.52-150000.188.1.x86_64", "product_id": "ghostscript-devel-9.52-150000.188.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-mini-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-mini-9.52-150000.188.1.x86_64", "product_id": "ghostscript-mini-9.52-150000.188.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-mini-devel-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-mini-devel-9.52-150000.188.1.x86_64", "product_id": "ghostscript-mini-devel-9.52-150000.188.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-9.52-150000.188.1.x86_64", "product": { "name": "ghostscript-x11-9.52-150000.188.1.x86_64", "product_id": "ghostscript-x11-9.52-150000.188.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-9.52-150000.188.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-9.52-150000.188.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-9.52-150000.188.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-9.52-150000.188.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-9.52-150000.188.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-9.52-150000.188.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-devel-9.52-150000.188.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.aarch64" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.ppc64le" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.s390x" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.x86_64" }, "product_reference": "ghostscript-x11-9.52-150000.188.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52722" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.x86_64", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.aarch64", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.s390x", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.x86_64", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.aarch64", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.s390x", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.x86_64", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.aarch64", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.s390x", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52722", "url": "https://www.suse.com/security/cve/CVE-2023-52722" }, { "category": "external", "summary": "SUSE Bug 1223852 for CVE-2023-52722", "url": "https://bugzilla.suse.com/1223852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.x86_64", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.aarch64", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.s390x", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.x86_64", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.aarch64", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.s390x", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.x86_64", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.aarch64", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.s390x", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.x86_64", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.aarch64", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.s390x", "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.x86_64", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.aarch64", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.s390x", "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.x86_64", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.aarch64", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.ppc64le", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.s390x", "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-18T11:06:19Z", "details": "moderate" } ], "title": "CVE-2023-52722" } ] }
wid-sec-w-2024-0980
Vulnerability from csaf_certbund
Published
2024-04-28 22:00
Modified
2025-01-12 23:00
Summary
Ghostscript: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Ghostscript ist ein kostenloser Interpreter der Seitenbeschreibungssprachen PostScript und Portable Document Format (PDF).
Angriff
Ein Angreifer kann eine Schwachstelle in Ghostscript ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Ghostscript ist ein kostenloser Interpreter der Seitenbeschreibungssprachen PostScript und Portable Document Format (PDF).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann eine Schwachstelle in Ghostscript ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0980 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0980.json" }, { "category": "self", "summary": "WID-SEC-2024-0980 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0980" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-04-28", "url": "https://github.com/advisories/GHSA-5473-w6gq-5r5g" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1568-1 vom 2024-05-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018490.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1590-1 vom 2024-05-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018501.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5692 vom 2024-05-16", "url": "https://lists.debian.org/debian-security-announce/2024/msg00102.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2553 vom 2024-05-30", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2553.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6835-1 vom 2024-06-18", "url": "https://ubuntu.com/security/notices/USN-6835-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1590-2 vom 2024-06-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WRCPRO4AOGCYDWVGZ5O2KERKG232SH6X/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1590-2 vom 2024-06-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018746.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1590-2 vom 2024-06-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRCPRO4AOGCYDWVGZ5O2KERKG232SH6X/" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06", "url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202409-03 vom 2024-09-22", "url": "https://security.gentoo.org/glsa/202409-03" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Ghostscript: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2025-01-12T23:00:00.000+00:00", "generator": { "date": "2025-01-13T11:08:58.201+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-0980", "initial_release_date": "2024-04-28T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-28T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-05-09T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-15T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-06-17T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-18T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-05T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-09-22T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T024663", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=10.01.0", "product": { "name": "Open Source Ghostscript \u003c=10.01.0", "product_id": "T034442" } }, { "category": "product_version_range", "name": "\u003c=10.01.0", "product": { "name": "Open Source Ghostscript \u003c=10.01.0", "product_id": "T034442-fixed" } } ], "category": "product_name", "name": "Ghostscript" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "v9 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v9 for Solaris", "product_id": "T028053", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52722", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Ghostscript. Diese ist darauf zur\u00fcckzuf\u00fchren, dass im SAFER-Modus weiterhin \"eexec-seeds\" verwendet werden k\u00f6nnen die nicht 1 sind. Ein Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T028053", "T014381", "2951", "T002207", "T000126", "T024663", "398363", "T012167" ], "last_affected": [ "T034442" ] }, "release_date": "2024-04-28T22:00:00.000+00:00", "title": "CVE-2023-52722" } ] }
gsd-2023-52722
Vulnerability from gsd
Modified
2024-04-28 05:01
Details
An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-52722" ], "details": "An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.", "id": "GSD-2023-52722", "modified": "2024-04-28T05:01:28.746814Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2023-52722", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1", "refsource": "MISC", "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1" } ] } }, "nvd.nist.gov": { "cve": { "descriptions": [ { "lang": "en", "value": "An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard." } ], "id": "CVE-2023-52722", "lastModified": "2024-04-28T00:15:07.270", "metrics": {}, "published": "2024-04-28T00:15:07.270", "references": [ { "source": "cve@mitre.org", "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Received" } } } }
opensuse-su-2024:14090-1
Vulnerability from csaf_opensuse
Published
2024-07-03 00:00
Modified
2024-07-03 00:00
Summary
ghostscript-10.03.1-1.1 on GA media
Notes
Title of the patch
ghostscript-10.03.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the ghostscript-10.03.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14090
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ghostscript-10.03.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ghostscript-10.03.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14090", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14090-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52722 page", "url": "https://www.suse.com/security/cve/CVE-2023-52722/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-29510 page", "url": "https://www.suse.com/security/cve/CVE-2024-29510/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-33869 page", "url": "https://www.suse.com/security/cve/CVE-2024-33869/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-33870 page", "url": "https://www.suse.com/security/cve/CVE-2024-33870/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-33871 page", "url": "https://www.suse.com/security/cve/CVE-2024-33871/" } ], "title": "ghostscript-10.03.1-1.1 on GA media", "tracking": { "current_release_date": "2024-07-03T00:00:00Z", "generator": { "date": "2024-07-03T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14090-1", "initial_release_date": "2024-07-03T00:00:00Z", "revision_history": [ { "date": "2024-07-03T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ghostscript-10.03.1-1.1.aarch64", "product": { "name": "ghostscript-10.03.1-1.1.aarch64", "product_id": "ghostscript-10.03.1-1.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-devel-10.03.1-1.1.aarch64", "product": { "name": "ghostscript-devel-10.03.1-1.1.aarch64", "product_id": "ghostscript-devel-10.03.1-1.1.aarch64" } }, { "category": "product_version", "name": "ghostscript-x11-10.03.1-1.1.aarch64", "product": { "name": "ghostscript-x11-10.03.1-1.1.aarch64", "product_id": "ghostscript-x11-10.03.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ghostscript-10.03.1-1.1.ppc64le", "product": { "name": "ghostscript-10.03.1-1.1.ppc64le", "product_id": "ghostscript-10.03.1-1.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-devel-10.03.1-1.1.ppc64le", "product": { "name": "ghostscript-devel-10.03.1-1.1.ppc64le", "product_id": "ghostscript-devel-10.03.1-1.1.ppc64le" } }, { "category": "product_version", "name": "ghostscript-x11-10.03.1-1.1.ppc64le", "product": { "name": "ghostscript-x11-10.03.1-1.1.ppc64le", "product_id": "ghostscript-x11-10.03.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ghostscript-10.03.1-1.1.s390x", "product": { "name": "ghostscript-10.03.1-1.1.s390x", "product_id": "ghostscript-10.03.1-1.1.s390x" } }, { "category": "product_version", "name": "ghostscript-devel-10.03.1-1.1.s390x", "product": { "name": "ghostscript-devel-10.03.1-1.1.s390x", "product_id": "ghostscript-devel-10.03.1-1.1.s390x" } }, { "category": "product_version", "name": "ghostscript-x11-10.03.1-1.1.s390x", "product": { "name": "ghostscript-x11-10.03.1-1.1.s390x", "product_id": "ghostscript-x11-10.03.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ghostscript-10.03.1-1.1.x86_64", "product": { "name": "ghostscript-10.03.1-1.1.x86_64", "product_id": "ghostscript-10.03.1-1.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-devel-10.03.1-1.1.x86_64", "product": { "name": "ghostscript-devel-10.03.1-1.1.x86_64", "product_id": "ghostscript-devel-10.03.1-1.1.x86_64" } }, { "category": "product_version", "name": "ghostscript-x11-10.03.1-1.1.x86_64", "product": { "name": "ghostscript-x11-10.03.1-1.1.x86_64", "product_id": "ghostscript-x11-10.03.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ghostscript-10.03.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64" }, "product_reference": "ghostscript-10.03.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-10.03.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le" }, "product_reference": "ghostscript-10.03.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-10.03.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x" }, "product_reference": "ghostscript-10.03.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-10.03.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64" }, "product_reference": "ghostscript-10.03.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-10.03.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64" }, "product_reference": "ghostscript-devel-10.03.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-10.03.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le" }, "product_reference": "ghostscript-devel-10.03.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-10.03.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x" }, "product_reference": "ghostscript-devel-10.03.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-devel-10.03.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64" }, "product_reference": "ghostscript-devel-10.03.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-10.03.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64" }, "product_reference": "ghostscript-x11-10.03.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-10.03.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le" }, "product_reference": "ghostscript-x11-10.03.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-10.03.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x" }, "product_reference": "ghostscript-x11-10.03.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ghostscript-x11-10.03.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" }, "product_reference": "ghostscript-x11-10.03.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52722" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52722", "url": "https://www.suse.com/security/cve/CVE-2023-52722" }, { "category": "external", "summary": "SUSE Bug 1223852 for CVE-2023-52722", "url": "https://bugzilla.suse.com/1223852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-03T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-52722" }, { "cve": "CVE-2024-29510", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-29510" } ], "notes": [ { "category": "general", "text": "Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-29510", "url": "https://www.suse.com/security/cve/CVE-2024-29510" }, { "category": "external", "summary": "SUSE Bug 1226945 for CVE-2024-29510", "url": "https://bugzilla.suse.com/1226945" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-03T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-29510" }, { "cve": "CVE-2024-33869", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-33869" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-33869", "url": "https://www.suse.com/security/cve/CVE-2024-33869" }, { "category": "external", "summary": "SUSE Bug 1226946 for CVE-2024-33869", "url": "https://bugzilla.suse.com/1226946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-03T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-33869" }, { "cve": "CVE-2024-33870", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-33870" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-33870", "url": "https://www.suse.com/security/cve/CVE-2024-33870" }, { "category": "external", "summary": "SUSE Bug 1226944 for CVE-2024-33870", "url": "https://bugzilla.suse.com/1226944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-03T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-33870" }, { "cve": "CVE-2024-33871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-33871" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbitrary name for a dynamic library; this library is then loaded.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-33871", "url": "https://www.suse.com/security/cve/CVE-2024-33871" }, { "category": "external", "summary": "SUSE Bug 1225491 for CVE-2024-33871", "url": "https://bugzilla.suse.com/1225491" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x", "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-03T00:00:00Z", "details": "important" } ], "title": "CVE-2024-33871" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…