OESA-2024-2163

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2163
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-2163.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-2163
Upstream
Published
2024-09-20T11:09:11Z
Modified
2025-08-12T05:43:15.966437Z
Summary
ghostscript security update
Details

Ghostscript is an interpreter for PostScript™ and Portable Document Format (PDF) files. Ghostscript consists of a PostScript interpreter layer, and a graphics library.

Security Fix(es):

Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdfbasefont_alloc.(CVE-2024-29508)

Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.(CVE-2024-29510)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / ghostscript

Package

Name
ghostscript
Purl
pkg:rpm/openEuler/ghostscript&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.52-15.oe2003sp4

Ecosystem specific

{
    "src": [
        "ghostscript-9.52-15.oe2003sp4.src.rpm"
    ],
    "noarch": [
        "ghostscript-help-9.52-15.oe2003sp4.noarch.rpm"
    ],
    "x86_64": [
        "ghostscript-9.52-15.oe2003sp4.x86_64.rpm",
        "ghostscript-debuginfo-9.52-15.oe2003sp4.x86_64.rpm",
        "ghostscript-debugsource-9.52-15.oe2003sp4.x86_64.rpm",
        "ghostscript-devel-9.52-15.oe2003sp4.x86_64.rpm",
        "ghostscript-tools-dvipdf-9.52-15.oe2003sp4.x86_64.rpm"
    ],
    "aarch64": [
        "ghostscript-9.52-15.oe2003sp4.aarch64.rpm",
        "ghostscript-debuginfo-9.52-15.oe2003sp4.aarch64.rpm",
        "ghostscript-debugsource-9.52-15.oe2003sp4.aarch64.rpm",
        "ghostscript-devel-9.52-15.oe2003sp4.aarch64.rpm",
        "ghostscript-tools-dvipdf-9.52-15.oe2003sp4.aarch64.rpm"
    ]
}