CVE-2024-33869
Publication date 9 May 2024
Last updated 24 July 2024
Ubuntu priority
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
Status
Package | Ubuntu Release | Status |
---|---|---|
ghostscript | 24.10 oracular |
Fixed 10.02.1~dfsg1-0ubuntu9
|
24.04 LTS noble |
Fixed 10.02.1~dfsg1-0ubuntu7.1
|
|
22.04 LTS jammy |
Fixed 9.55.0~dfsg1-0ubuntu5.7
|
|
20.04 LTS focal |
Fixed 9.50~dfsg-5ubuntu4.12
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
References
Related Ubuntu Security Notices (USN)
- USN-6835-1
- Ghostscript vulnerabilities
- 17 June 2024