RLSA-2024:6197

Source
https://errata.rockylinux.org/RLSA-2024:6197
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:6197.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2024:6197
Published
2025-05-07T19:13:05.465265Z
Modified
2025-05-07T19:48:10.414357Z
Upstream
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L CVSS Calculator
Summary
Moderate: ghostscript security update
Details

The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

  • ghostscript: format string injection leads to shell command execution (SAFER bypass) (CVE-2024-29510)

  • ghostscript: path traversal and command execution due to path reduction (CVE-2024-33869)

  • ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths (CVE-2024-33870)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / ghostscript

Package

Name
ghostscript
Purl
pkg:rpm/rocky-linux/ghostscript?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:9.54.0-17.el9_4