Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-52722 (GCVE-0-2023-52722)
Vulnerability from cvelistv5 – Published: 2024-04-27 00:00 – Updated: 2024-12-04 21:03
VLAI?
EPSS
Summary
An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
Severity ?
5.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-52722",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-29T19:14:51.635054Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T21:03:25.395Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:11:35.806Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1"
},
{
"name": "[oss-security] 20240628 Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code execution",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-03T18:49:41.423Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1"
},
{
"name": "[oss-security] 20240628 Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code execution",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/2"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-52722",
"datePublished": "2024-04-27T00:00:00.000Z",
"dateReserved": "2024-04-27T00:00:00.000Z",
"dateUpdated": "2024-12-04T21:03:25.395Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.\"}, {\"lang\": \"es\", \"value\": \"Se descubri\\u00f3 un problema en Artifex Ghostscript hasta la versi\\u00f3n 10.01.0. psi/zmisc1.c, cuando se utiliza el modo M\\u00c1S SEGURO, permite semillas eexec distintas al est\\u00e1ndar Tipo 1.\"}]",
"id": "CVE-2023-52722",
"lastModified": "2024-12-04T21:15:19.983",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2024-04-28T00:15:07.270",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/28/2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/28/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-52722\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-04-28T00:15:07.270\",\"lastModified\":\"2025-06-23T18:35:47.363\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 un problema en Artifex Ghostscript hasta la versi\u00f3n 10.01.0. psi/zmisc1.c, cuando se utiliza el modo M\u00c1S SEGURO, permite semillas eexec distintas al est\u00e1ndar Tipo 1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.03.1\",\"matchCriteriaId\":\"62DFF97A-B408-4992-940C-5AEAFCB69A99\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2024/06/28/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/06/28/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/28/2\", \"name\": \"[oss-security] 20240628 Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code execution\", \"tags\": [\"mailing-list\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T23:11:35.806Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-52722\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-29T19:14:51.635054Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-29T19:15:06.409Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/28/2\", \"name\": \"[oss-security] 20240628 Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code execution\", \"tags\": [\"mailing-list\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-07-03T18:49:41.423299\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-52722\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-04T21:03:25.395Z\", \"dateReserved\": \"2024-04-27T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-04-27T00:00:00\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-5473-W6GQ-5R5G
Vulnerability from github – Published: 2024-04-28 00:30 – Updated: 2024-12-04 21:30
VLAI?
Details
An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2023-52722"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-04-28T00:15:07Z",
"severity": "MODERATE"
},
"details": "An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.",
"id": "GHSA-5473-w6gq-5r5g",
"modified": "2024-12-04T21:30:51Z",
"published": "2024-04-28T00:30:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52722"
},
{
"type": "WEB",
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
SUSE-SU-2024:1590-2
Vulnerability from csaf_suse - Published: 2024-06-18 11:06 - Updated: 2024-06-18 11:06Summary
Security update for ghostscript
Severity
Moderate
Notes
Title of the patch: Security update for ghostscript
Description of the patch: This update for ghostscript fixes the following issues:
- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).
Patchnames: SUSE-2024-1590,SUSE-SLE-Module-Basesystem-15-SP6-2024-1590,openSUSE-SLE-15.6-2024-1590
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ghostscript",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ghostscript fixes the following issues:\n\n- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-1590,SUSE-SLE-Module-Basesystem-15-SP6-2024-1590,openSUSE-SLE-15.6-2024-1590",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1590-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:1590-2",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241590-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:1590-2",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035623.html"
},
{
"category": "self",
"summary": "SUSE Bug 1223852",
"url": "https://bugzilla.suse.com/1223852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52722 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52722/"
}
],
"title": "Security update for ghostscript",
"tracking": {
"current_release_date": "2024-06-18T11:06:19Z",
"generator": {
"date": "2024-06-18T11:06:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:1590-2",
"initial_release_date": "2024-06-18T11:06:19Z",
"revision_history": [
{
"date": "2024-06-18T11:06:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-9.52-150000.188.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-devel-9.52-150000.188.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-mini-9.52-150000.188.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-x11-9.52-150000.188.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-9.52-150000.188.1.i586",
"product_id": "ghostscript-9.52-150000.188.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.i586",
"product_id": "ghostscript-devel-9.52-150000.188.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.i586",
"product_id": "ghostscript-mini-9.52-150000.188.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.i586",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.i586",
"product_id": "ghostscript-x11-9.52-150000.188.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-9.52-150000.188.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-devel-9.52-150000.188.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-mini-9.52-150000.188.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-x11-9.52-150000.188.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-9.52-150000.188.1.s390x",
"product_id": "ghostscript-9.52-150000.188.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.s390x",
"product_id": "ghostscript-devel-9.52-150000.188.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.s390x",
"product_id": "ghostscript-mini-9.52-150000.188.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.s390x",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.s390x",
"product_id": "ghostscript-x11-9.52-150000.188.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-9.52-150000.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-devel-9.52-150000.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-mini-9.52-150000.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-x11-9.52-150000.188.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-9.52-150000.188.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-9.52-150000.188.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52722"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.s390x",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.s390x",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.s390x",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52722",
"url": "https://www.suse.com/security/cve/CVE-2023-52722"
},
{
"category": "external",
"summary": "SUSE Bug 1223852 for CVE-2023-52722",
"url": "https://bugzilla.suse.com/1223852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.s390x",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.s390x",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.s390x",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-devel-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ghostscript-x11-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.s390x",
"openSUSE Leap 15.6:ghostscript-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.s390x",
"openSUSE Leap 15.6:ghostscript-devel-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.s390x",
"openSUSE Leap 15.6:ghostscript-x11-9.52-150000.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-18T11:06:19Z",
"details": "moderate"
}
],
"title": "CVE-2023-52722"
}
]
}
SUSE-SU-2024:1590-1
Vulnerability from csaf_suse - Published: 2024-05-10 07:19 - Updated: 2024-05-10 07:19Summary
Security update for ghostscript
Severity
Moderate
Notes
Title of the patch: Security update for ghostscript
Description of the patch: This update for ghostscript fixes the following issues:
- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).
Patchnames: SUSE-2024-1590,SUSE-SLE-Module-Basesystem-15-SP5-2024-1590,openSUSE-SLE-15.5-2024-1590
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ghostscript",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ghostscript fixes the following issues:\n\n- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-1590,SUSE-SLE-Module-Basesystem-15-SP5-2024-1590,openSUSE-SLE-15.5-2024-1590",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1590-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:1590-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241590-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:1590-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018501.html"
},
{
"category": "self",
"summary": "SUSE Bug 1223852",
"url": "https://bugzilla.suse.com/1223852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52722 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52722/"
}
],
"title": "Security update for ghostscript",
"tracking": {
"current_release_date": "2024-05-10T07:19:33Z",
"generator": {
"date": "2024-05-10T07:19:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:1590-1",
"initial_release_date": "2024-05-10T07:19:33Z",
"revision_history": [
{
"date": "2024-05-10T07:19:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-9.52-150000.188.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-devel-9.52-150000.188.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-mini-9.52-150000.188.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.aarch64",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.aarch64",
"product_id": "ghostscript-x11-9.52-150000.188.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-9.52-150000.188.1.i586",
"product_id": "ghostscript-9.52-150000.188.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.i586",
"product_id": "ghostscript-devel-9.52-150000.188.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.i586",
"product_id": "ghostscript-mini-9.52-150000.188.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.i586",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.i586",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.i586",
"product_id": "ghostscript-x11-9.52-150000.188.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-9.52-150000.188.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-devel-9.52-150000.188.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-mini-9.52-150000.188.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.ppc64le",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.ppc64le",
"product_id": "ghostscript-x11-9.52-150000.188.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-9.52-150000.188.1.s390x",
"product_id": "ghostscript-9.52-150000.188.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.s390x",
"product_id": "ghostscript-devel-9.52-150000.188.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.s390x",
"product_id": "ghostscript-mini-9.52-150000.188.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.s390x",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.s390x",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.s390x",
"product_id": "ghostscript-x11-9.52-150000.188.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-9.52-150000.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-devel-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-devel-9.52-150000.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-mini-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-mini-9.52-150000.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-mini-devel-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-mini-devel-9.52-150000.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-150000.188.1.x86_64",
"product": {
"name": "ghostscript-x11-9.52-150000.188.1.x86_64",
"product_id": "ghostscript-x11-9.52-150000.188.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-9.52-150000.188.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-9.52-150000.188.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-devel-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.aarch64"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.ppc64le"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.s390x"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-150000.188.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.x86_64"
},
"product_reference": "ghostscript-x11-9.52-150000.188.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52722"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.s390x",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.s390x",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.s390x",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52722",
"url": "https://www.suse.com/security/cve/CVE-2023-52722"
},
{
"category": "external",
"summary": "SUSE Bug 1223852 for CVE-2023-52722",
"url": "https://bugzilla.suse.com/1223852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.s390x",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.s390x",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.s390x",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-devel-9.52-150000.188.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:ghostscript-x11-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.s390x",
"openSUSE Leap 15.5:ghostscript-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.s390x",
"openSUSE Leap 15.5:ghostscript-devel-9.52-150000.188.1.x86_64",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.aarch64",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.ppc64le",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.s390x",
"openSUSE Leap 15.5:ghostscript-x11-9.52-150000.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-10T07:19:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52722"
}
]
}
SUSE-SU-2024:1568-1
Vulnerability from csaf_suse - Published: 2024-05-09 11:17 - Updated: 2024-05-09 11:17Summary
Security update for ghostscript
Severity
Moderate
Notes
Title of the patch: Security update for ghostscript
Description of the patch: This update for ghostscript fixes the following issues:
- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).
Patchnames: SUSE-2024-1568,SUSE-SLE-SDK-12-SP5-2024-1568,SUSE-SLE-SERVER-12-SP5-2024-1568
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ghostscript",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ghostscript fixes the following issues:\n\n- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-1568,SUSE-SLE-SDK-12-SP5-2024-1568,SUSE-SLE-SERVER-12-SP5-2024-1568",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1568-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:1568-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241568-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:1568-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-May/035209.html"
},
{
"category": "self",
"summary": "SUSE Bug 1223852",
"url": "https://bugzilla.suse.com/1223852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52722 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52722/"
}
],
"title": "Security update for ghostscript",
"tracking": {
"current_release_date": "2024-05-09T11:17:16Z",
"generator": {
"date": "2024-05-09T11:17:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:1568-1",
"initial_release_date": "2024-05-09T11:17:16Z",
"revision_history": [
{
"date": "2024-05-09T11:17:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-23.74.1.aarch64",
"product": {
"name": "ghostscript-9.52-23.74.1.aarch64",
"product_id": "ghostscript-9.52-23.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-23.74.1.aarch64",
"product": {
"name": "ghostscript-devel-9.52-23.74.1.aarch64",
"product_id": "ghostscript-devel-9.52-23.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-23.74.1.aarch64",
"product": {
"name": "ghostscript-mini-9.52-23.74.1.aarch64",
"product_id": "ghostscript-mini-9.52-23.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-23.74.1.aarch64",
"product": {
"name": "ghostscript-mini-devel-9.52-23.74.1.aarch64",
"product_id": "ghostscript-mini-devel-9.52-23.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-23.74.1.aarch64",
"product": {
"name": "ghostscript-x11-9.52-23.74.1.aarch64",
"product_id": "ghostscript-x11-9.52-23.74.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-23.74.1.i586",
"product": {
"name": "ghostscript-9.52-23.74.1.i586",
"product_id": "ghostscript-9.52-23.74.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-23.74.1.i586",
"product": {
"name": "ghostscript-devel-9.52-23.74.1.i586",
"product_id": "ghostscript-devel-9.52-23.74.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-23.74.1.i586",
"product": {
"name": "ghostscript-mini-9.52-23.74.1.i586",
"product_id": "ghostscript-mini-9.52-23.74.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-23.74.1.i586",
"product": {
"name": "ghostscript-mini-devel-9.52-23.74.1.i586",
"product_id": "ghostscript-mini-devel-9.52-23.74.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-23.74.1.i586",
"product": {
"name": "ghostscript-x11-9.52-23.74.1.i586",
"product_id": "ghostscript-x11-9.52-23.74.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-23.74.1.ppc64le",
"product": {
"name": "ghostscript-9.52-23.74.1.ppc64le",
"product_id": "ghostscript-9.52-23.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-23.74.1.ppc64le",
"product": {
"name": "ghostscript-devel-9.52-23.74.1.ppc64le",
"product_id": "ghostscript-devel-9.52-23.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-23.74.1.ppc64le",
"product": {
"name": "ghostscript-mini-9.52-23.74.1.ppc64le",
"product_id": "ghostscript-mini-9.52-23.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-23.74.1.ppc64le",
"product": {
"name": "ghostscript-mini-devel-9.52-23.74.1.ppc64le",
"product_id": "ghostscript-mini-devel-9.52-23.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-23.74.1.ppc64le",
"product": {
"name": "ghostscript-x11-9.52-23.74.1.ppc64le",
"product_id": "ghostscript-x11-9.52-23.74.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-23.74.1.s390",
"product": {
"name": "ghostscript-9.52-23.74.1.s390",
"product_id": "ghostscript-9.52-23.74.1.s390"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-23.74.1.s390",
"product": {
"name": "ghostscript-devel-9.52-23.74.1.s390",
"product_id": "ghostscript-devel-9.52-23.74.1.s390"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-23.74.1.s390",
"product": {
"name": "ghostscript-mini-9.52-23.74.1.s390",
"product_id": "ghostscript-mini-9.52-23.74.1.s390"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-23.74.1.s390",
"product": {
"name": "ghostscript-mini-devel-9.52-23.74.1.s390",
"product_id": "ghostscript-mini-devel-9.52-23.74.1.s390"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-23.74.1.s390",
"product": {
"name": "ghostscript-x11-9.52-23.74.1.s390",
"product_id": "ghostscript-x11-9.52-23.74.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-23.74.1.s390x",
"product": {
"name": "ghostscript-9.52-23.74.1.s390x",
"product_id": "ghostscript-9.52-23.74.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-23.74.1.s390x",
"product": {
"name": "ghostscript-devel-9.52-23.74.1.s390x",
"product_id": "ghostscript-devel-9.52-23.74.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-23.74.1.s390x",
"product": {
"name": "ghostscript-mini-9.52-23.74.1.s390x",
"product_id": "ghostscript-mini-9.52-23.74.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-23.74.1.s390x",
"product": {
"name": "ghostscript-mini-devel-9.52-23.74.1.s390x",
"product_id": "ghostscript-mini-devel-9.52-23.74.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-23.74.1.s390x",
"product": {
"name": "ghostscript-x11-9.52-23.74.1.s390x",
"product_id": "ghostscript-x11-9.52-23.74.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.52-23.74.1.x86_64",
"product": {
"name": "ghostscript-9.52-23.74.1.x86_64",
"product_id": "ghostscript-9.52-23.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.52-23.74.1.x86_64",
"product": {
"name": "ghostscript-devel-9.52-23.74.1.x86_64",
"product_id": "ghostscript-devel-9.52-23.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.52-23.74.1.x86_64",
"product": {
"name": "ghostscript-mini-9.52-23.74.1.x86_64",
"product_id": "ghostscript-mini-9.52-23.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.52-23.74.1.x86_64",
"product": {
"name": "ghostscript-mini-devel-9.52-23.74.1.x86_64",
"product_id": "ghostscript-mini-devel-9.52-23.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.52-23.74.1.x86_64",
"product": {
"name": "ghostscript-x11-9.52-23.74.1.x86_64",
"product_id": "ghostscript-x11-9.52-23.74.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.s390x"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.aarch64"
},
"product_reference": "ghostscript-9.52-23.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.ppc64le"
},
"product_reference": "ghostscript-9.52-23.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.s390x"
},
"product_reference": "ghostscript-9.52-23.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.x86_64"
},
"product_reference": "ghostscript-9.52-23.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.s390x"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64"
},
"product_reference": "ghostscript-x11-9.52-23.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le"
},
"product_reference": "ghostscript-x11-9.52-23.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.s390x"
},
"product_reference": "ghostscript-x11-9.52-23.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64"
},
"product_reference": "ghostscript-x11-9.52-23.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.aarch64"
},
"product_reference": "ghostscript-9.52-23.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.ppc64le"
},
"product_reference": "ghostscript-9.52-23.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.s390x"
},
"product_reference": "ghostscript-9.52-23.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.x86_64"
},
"product_reference": "ghostscript-9.52-23.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.s390x"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64"
},
"product_reference": "ghostscript-devel-9.52-23.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-23.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64"
},
"product_reference": "ghostscript-x11-9.52-23.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-23.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le"
},
"product_reference": "ghostscript-x11-9.52-23.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-23.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.s390x"
},
"product_reference": "ghostscript-x11-9.52-23.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.52-23.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64"
},
"product_reference": "ghostscript-x11-9.52-23.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52722"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52722",
"url": "https://www.suse.com/security/cve/CVE-2023-52722"
},
{
"category": "external",
"summary": "SUSE Bug 1223852 for CVE-2023-52722",
"url": "https://bugzilla.suse.com/1223852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ghostscript-x11-9.52-23.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ghostscript-devel-9.52-23.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-09T11:17:16Z",
"details": "moderate"
}
],
"title": "CVE-2023-52722"
}
]
}
WID-SEC-W-2024-0980
Vulnerability from csaf_certbund - Published: 2024-04-28 22:00 - Updated: 2025-01-12 23:00Summary
Ghostscript: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Ghostscript ist ein kostenloser Interpreter der Seitenbeschreibungssprachen PostScript und Portable Document Format (PDF).
Angriff: Ein Angreifer kann eine Schwachstelle in Ghostscript ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme: - Linux
- UNIX
- Windows
Es existiert eine Schwachstelle in Ghostscript. Diese ist darauf zurückzuführen, dass im SAFER-Modus weiterhin "eexec-seeds" verwendet werden können die nicht 1 sind. Ein Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Ghostscript ist ein kostenloser Interpreter der Seitenbeschreibungssprachen PostScript und Portable Document Format (PDF).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann eine Schwachstelle in Ghostscript ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0980 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0980.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0980 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0980"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-04-28",
"url": "https://github.com/advisories/GHSA-5473-w6gq-5r5g"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1568-1 vom 2024-05-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018490.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1590-1 vom 2024-05-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018501.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5692 vom 2024-05-16",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00102.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2553 vom 2024-05-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2553.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6835-1 vom 2024-06-18",
"url": "https://ubuntu.com/security/notices/USN-6835-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1590-2 vom 2024-06-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WRCPRO4AOGCYDWVGZ5O2KERKG232SH6X/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1590-2 vom 2024-06-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018746.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1590-2 vom 2024-06-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRCPRO4AOGCYDWVGZ5O2KERKG232SH6X/"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
"url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202409-03 vom 2024-09-22",
"url": "https://security.gentoo.org/glsa/202409-03"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
}
],
"source_lang": "en-US",
"title": "Ghostscript: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2025-01-12T23:00:00.000+00:00",
"generator": {
"date": "2025-01-13T11:08:58.201+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-0980",
"initial_release_date": "2024-04-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-05-09T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-15T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-06-17T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-18T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC Avamar",
"product": {
"name": "EMC Avamar",
"product_id": "T014381",
"product_identification_helper": {
"cpe": "cpe:/a:emc:avamar:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.01.0",
"product": {
"name": "Open Source Ghostscript \u003c=10.01.0",
"product_id": "T034442"
}
},
{
"category": "product_version_range",
"name": "\u003c=10.01.0",
"product": {
"name": "Open Source Ghostscript \u003c=10.01.0",
"product_id": "T034442-fixed"
}
}
],
"category": "product_name",
"name": "Ghostscript"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9 for Solaris",
"product": {
"name": "Xerox FreeFlow Print Server v9 for Solaris",
"product_id": "T028053",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52722",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Ghostscript. Diese ist darauf zur\u00fcckzuf\u00fchren, dass im SAFER-Modus weiterhin \"eexec-seeds\" verwendet werden k\u00f6nnen die nicht 1 sind. Ein Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T028053",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T012167"
],
"last_affected": [
"T034442"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2023-52722"
}
]
}
OPENSUSE-SU-2024:14090-1
Vulnerability from csaf_opensuse - Published: 2024-07-03 00:00 - Updated: 2024-07-03 00:00Summary
ghostscript-10.03.1-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: ghostscript-10.03.1-1.1 on GA media
Description of the patch: These are all security issues fixed in the ghostscript-10.03.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-14090
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ghostscript-10.03.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ghostscript-10.03.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14090",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14090-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52722 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-29510 page",
"url": "https://www.suse.com/security/cve/CVE-2024-29510/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-33869 page",
"url": "https://www.suse.com/security/cve/CVE-2024-33869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-33870 page",
"url": "https://www.suse.com/security/cve/CVE-2024-33870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-33871 page",
"url": "https://www.suse.com/security/cve/CVE-2024-33871/"
}
],
"title": "ghostscript-10.03.1-1.1 on GA media",
"tracking": {
"current_release_date": "2024-07-03T00:00:00Z",
"generator": {
"date": "2024-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14090-1",
"initial_release_date": "2024-07-03T00:00:00Z",
"revision_history": [
{
"date": "2024-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-10.03.1-1.1.aarch64",
"product": {
"name": "ghostscript-10.03.1-1.1.aarch64",
"product_id": "ghostscript-10.03.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-10.03.1-1.1.aarch64",
"product": {
"name": "ghostscript-devel-10.03.1-1.1.aarch64",
"product_id": "ghostscript-devel-10.03.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-10.03.1-1.1.aarch64",
"product": {
"name": "ghostscript-x11-10.03.1-1.1.aarch64",
"product_id": "ghostscript-x11-10.03.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-10.03.1-1.1.ppc64le",
"product": {
"name": "ghostscript-10.03.1-1.1.ppc64le",
"product_id": "ghostscript-10.03.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-10.03.1-1.1.ppc64le",
"product": {
"name": "ghostscript-devel-10.03.1-1.1.ppc64le",
"product_id": "ghostscript-devel-10.03.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-10.03.1-1.1.ppc64le",
"product": {
"name": "ghostscript-x11-10.03.1-1.1.ppc64le",
"product_id": "ghostscript-x11-10.03.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-10.03.1-1.1.s390x",
"product": {
"name": "ghostscript-10.03.1-1.1.s390x",
"product_id": "ghostscript-10.03.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-10.03.1-1.1.s390x",
"product": {
"name": "ghostscript-devel-10.03.1-1.1.s390x",
"product_id": "ghostscript-devel-10.03.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-10.03.1-1.1.s390x",
"product": {
"name": "ghostscript-x11-10.03.1-1.1.s390x",
"product_id": "ghostscript-x11-10.03.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-10.03.1-1.1.x86_64",
"product": {
"name": "ghostscript-10.03.1-1.1.x86_64",
"product_id": "ghostscript-10.03.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-10.03.1-1.1.x86_64",
"product": {
"name": "ghostscript-devel-10.03.1-1.1.x86_64",
"product_id": "ghostscript-devel-10.03.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-10.03.1-1.1.x86_64",
"product": {
"name": "ghostscript-x11-10.03.1-1.1.x86_64",
"product_id": "ghostscript-x11-10.03.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-10.03.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64"
},
"product_reference": "ghostscript-10.03.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-10.03.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le"
},
"product_reference": "ghostscript-10.03.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-10.03.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x"
},
"product_reference": "ghostscript-10.03.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-10.03.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64"
},
"product_reference": "ghostscript-10.03.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-10.03.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64"
},
"product_reference": "ghostscript-devel-10.03.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-10.03.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le"
},
"product_reference": "ghostscript-devel-10.03.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-10.03.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x"
},
"product_reference": "ghostscript-devel-10.03.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-10.03.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64"
},
"product_reference": "ghostscript-devel-10.03.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-10.03.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64"
},
"product_reference": "ghostscript-x11-10.03.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-10.03.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le"
},
"product_reference": "ghostscript-x11-10.03.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-10.03.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x"
},
"product_reference": "ghostscript-x11-10.03.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-10.03.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
},
"product_reference": "ghostscript-x11-10.03.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52722"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52722",
"url": "https://www.suse.com/security/cve/CVE-2023-52722"
},
{
"category": "external",
"summary": "SUSE Bug 1223852 for CVE-2023-52722",
"url": "https://bugzilla.suse.com/1223852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52722"
},
{
"cve": "CVE-2024-29510",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-29510"
}
],
"notes": [
{
"category": "general",
"text": "Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-29510",
"url": "https://www.suse.com/security/cve/CVE-2024-29510"
},
{
"category": "external",
"summary": "SUSE Bug 1226945 for CVE-2024-29510",
"url": "https://bugzilla.suse.com/1226945"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-29510"
},
{
"cve": "CVE-2024-33869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-33869"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-33869",
"url": "https://www.suse.com/security/cve/CVE-2024-33869"
},
{
"category": "external",
"summary": "SUSE Bug 1226946 for CVE-2024-33869",
"url": "https://bugzilla.suse.com/1226946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-33869"
},
{
"cve": "CVE-2024-33870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-33870"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-33870",
"url": "https://www.suse.com/security/cve/CVE-2024-33870"
},
{
"category": "external",
"summary": "SUSE Bug 1226944 for CVE-2024-33870",
"url": "https://bugzilla.suse.com/1226944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-33870"
},
{
"cve": "CVE-2024-33871",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-33871"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbitrary name for a dynamic library; this library is then loaded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-33871",
"url": "https://www.suse.com/security/cve/CVE-2024-33871"
},
{
"category": "external",
"summary": "SUSE Bug 1225491 for CVE-2024-33871",
"url": "https://bugzilla.suse.com/1225491"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-devel-10.03.1-1.1.x86_64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.aarch64",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.ppc64le",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.s390x",
"openSUSE Tumbleweed:ghostscript-x11-10.03.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-33871"
}
]
}
BDU:2024-07479
Vulnerability from fstec - Published: 27.04.2024
VLAI Severity ?
Title
Уязвимость файла afqkf psi/zmisc1.c набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с неправильной проверкой входных данных, позволяющая нарушителю выполнить произвольный код в системе
Description
Уязвимость файла afqkf psi/zmisc1.c набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript связана с неправильной проверкой входных данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код
Severity ?
Vendor
Red Hat Inc., Сообщество свободного программного обеспечения, ООО «Ред Софт», ООО «РусБИТех-Астра», АО «НТЦ ИТ РОСА», АО «ИВК», Artifex Software Inc., АО "НППКТ"
Software Name
Red Hat Enterprise Linux, Debian GNU/Linux, РЕД ОС (запись в едином реестре российских программ №3751), Astra Linux Special Edition (запись в едином реестре российских программ №369), РОСА ХРОМ (запись в едином реестре российских программ №1607), АЛЬТ СП 10, Ghostscript, ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
8 (Red Hat Enterprise Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (РЕД ОС), 9 (Red Hat Enterprise Linux), 4.7 (Astra Linux Special Edition), 12.4 (РОСА ХРОМ), - (АЛЬТ СП 10), до 10.03.1 (Ghostscript), до 2.11 (ОСОН ОСнова Оnyx), 3.8 (Astra Linux Special Edition)
Possible Mitigations
Для ghostscript:
https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1
Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2023-52722
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2023-52722
Для ОСОН ОСнова Оnyx: Обновление программного обеспечения ghostscript до версии 9.53.3~dfsg-7+deb11u7
Для Astra Linux Special Edition 4.7 для архитектуры ARM:
обновить пакет ghostscript до 9.53.3~dfsg-7+deb11u7.astra1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47
Для ОС Альт 8 СП (релиз 10): установка обновления из публичного репозитория программного средства
Для операционной системы РОСА ХРОМ: https://abf.rosa.ru/advisories/ROSA-SA-2025-2979
Для ОС Astra Linux:
обновить пакет ghostscript до 10.0.0~dfsg-11+deb12u7.astra1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38
Для ОС Astra Linux:
обновить пакет ghostscript до 10.0.0~dfsg-11+deb12u7.astra1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38
Reference
https://redos.red-soft.ru/support/secure/
https://security-tracker.debian.org/tracker/CVE-2023-52722
https://access.redhat.com/security/cve/CVE-2023-52722
https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.11/
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47
https://altsp.su/obnovleniya-bezopasnosti/
https://abf.rosa.ru/advisories/ROSA-SA-2025-2979
https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38
https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38
CWE
CWE-20
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Artifex Software Inc., \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 9 (Red Hat Enterprise Linux), 4.7 (Astra Linux Special Edition), 12.4 (\u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10), \u0434\u043e 10.03.1 (Ghostscript), \u0434\u043e 2.11 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), 3.8 (Astra Linux Special Edition)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f ghostscript:\nhttps://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2023-52722\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2023-52722\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx: \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f ghostscript \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 9.53.3~dfsg-7+deb11u7\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7 \u0434\u043b\u044f \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b ARM:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 ghostscript \u0434\u043e 9.53.3~dfsg-7+deb11u7.astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0440\u0435\u043b\u0438\u0437 10): \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c: https://abf.rosa.ru/advisories/ROSA-SA-2025-2979\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 ghostscript \u0434\u043e 10.0.0~dfsg-11+deb12u7.astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 ghostscript \u0434\u043e 10.0.0~dfsg-11+deb12u7.astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.04.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.02.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "24.09.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-07479",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-52722",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), \u0410\u041b\u042c\u0422 \u0421\u041f 10, Ghostscript, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Red Hat Inc. Red Hat Enterprise Linux 9 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c 12.4 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - , \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.11 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 3.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0430\u0439\u043b\u0430 afqkf psi/zmisc1.c \u043d\u0430\u0431\u043e\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438, \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0438 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432 Ghostscript, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0430\u0439\u043b\u0430 afqkf psi/zmisc1.c \u043d\u0430\u0431\u043e\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438, \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0438 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432 Ghostscript \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://redos.red-soft.ru/support/secure/\nhttps://security-tracker.debian.org/tracker/CVE-2023-52722\nhttps://access.redhat.com/security/cve/CVE-2023-52722\nhttps://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.11/\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://abf.rosa.ru/advisories/ROSA-SA-2025-2979\nhttps://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38\nhttps://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
FKIE_CVE-2023-52722
Vulnerability from fkie_nvd - Published: 2024-04-28 00:15 - Updated: 2025-06-23 18:35
Severity ?
Summary
An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2024/06/28/2 | Mailing List | |
| cve@mitre.org | https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/06/28/2 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1 | Patch |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| artifex | ghostscript | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62DFF97A-B408-4992-940C-5AEAFCB69A99",
"versionEndExcluding": "10.03.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Artifex Ghostscript hasta la versi\u00f3n 10.01.0. psi/zmisc1.c, cuando se utiliza el modo M\u00c1S SEGURO, permite semillas eexec distintas al est\u00e1ndar Tipo 1."
}
],
"id": "CVE-2023-52722",
"lastModified": "2025-06-23T18:35:47.363",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-04-28T00:15:07.270",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2023-52722
Vulnerability from gsd - Updated: 2024-04-28 05:01Details
An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-52722"
],
"details": "An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.",
"id": "GSD-2023-52722",
"modified": "2024-04-28T05:01:28.746814Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-52722",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1",
"refsource": "MISC",
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard."
}
],
"id": "CVE-2023-52722",
"lastModified": "2024-04-28T00:15:07.270",
"metrics": {},
"published": "2024-04-28T00:15:07.270",
"references": [
{
"source": "cve@mitre.org",
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Received"
}
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…