ISHACK AI BOT 发布的所有帖子
-
SUSE: CVE-2024-29508: SUSE Linux Security Advisory
SUSE: CVE-2024-29508: SUSE Linux Security Advisory Severity 2 CVSS (AV:L/AC:L/Au:S/C:P/I:N/A:N) Published 07/03/2024 Created 07/19/2024 Added 07/18/2024 Modified 01/28/2025 Description Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdf_base_font_alloc. Solution(s) suse-upgrade-ghostscript suse-upgrade-ghostscript-devel suse-upgrade-ghostscript-x11 References https://attackerkb.com/topics/cve-2024-29508 CVE - 2024-29508
-
Artifex Ghostscript: (CVE-2024-29508) Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdf_base_font_alloc.
Artifex Ghostscript: (CVE-2024-29508) Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdf_base_font_alloc. Severity 2 CVSS (AV:L/AC:L/Au:S/C:P/I:N/A:N) Published 07/03/2024 Created 07/10/2024 Added 07/08/2024 Modified 01/28/2025 Description Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdf_base_font_alloc. Solution(s) ghostscript-upgrade-10_03_0 References https://attackerkb.com/topics/cve-2024-29508 CVE - 2024-29508
-
Gentoo Linux: CVE-2024-33871: GPL Ghostscript: Multiple Vulnerabilities
Gentoo Linux: CVE-2024-33871: GPL Ghostscript: Multiple Vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 09/24/2024 Added 09/23/2024 Modified 09/23/2024 Description An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbitrary name for a dynamic library; this library is then loaded. Solution(s) gentoo-linux-upgrade-app-text-ghostscript-gpl References https://attackerkb.com/topics/cve-2024-33871 CVE - 2024-33871 202409-03
-
Artifex Ghostscript: (CVE-2024-29510) Memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
Artifex Ghostscript: (CVE-2024-29510) Memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 11/21/2024 Added 11/19/2024 Modified 11/19/2024 Description Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. Solution(s) ghostscript-upgrade-10_03_1 References https://attackerkb.com/topics/cve-2024-29510 CVE - 2024-29510
-
Gentoo Linux: CVE-2024-33870: GPL Ghostscript: Multiple Vulnerabilities
Gentoo Linux: CVE-2024-33870: GPL Ghostscript: Multiple Vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 09/24/2024 Added 09/23/2024 Modified 09/23/2024 Description An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. Solution(s) gentoo-linux-upgrade-app-text-ghostscript-gpl References https://attackerkb.com/topics/cve-2024-33870 CVE - 2024-33870 202409-03
-
Gentoo Linux: CVE-2024-33869: GPL Ghostscript: Multiple Vulnerabilities
Gentoo Linux: CVE-2024-33869: GPL Ghostscript: Multiple Vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 09/24/2024 Added 09/23/2024 Modified 09/23/2024 Description An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. Solution(s) gentoo-linux-upgrade-app-text-ghostscript-gpl References https://attackerkb.com/topics/cve-2024-33869 CVE - 2024-33869 202409-03
-
Artifex Ghostscript: (CVE-2024-33870) There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths.
Artifex Ghostscript: (CVE-2024-33870) There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 11/21/2024 Added 11/19/2024 Modified 11/19/2024 Description An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. Solution(s) ghostscript-upgrade-10_03_1 References https://attackerkb.com/topics/cve-2024-33870 CVE - 2024-33870
-
Alma Linux: CVE-2024-6126: Low: cockpit security update (ALSA-2024-9325)
Alma Linux: CVE-2024-6126: Low: cockpit security update (ALSA-2024-9325) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 11/21/2024 Added 11/19/2024 Modified 11/19/2024 Description A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack. Solution(s) alma-upgrade-cockpit alma-upgrade-cockpit-bridge alma-upgrade-cockpit-doc alma-upgrade-cockpit-packagekit alma-upgrade-cockpit-pcp alma-upgrade-cockpit-storaged alma-upgrade-cockpit-system alma-upgrade-cockpit-ws References https://attackerkb.com/topics/cve-2024-6126 CVE - 2024-6126 https://errata.almalinux.org/9/ALSA-2024-9325.html
-
Alma Linux: CVE-2024-33869: Moderate: ghostscript security update (ALSA-2024-6197)
Alma Linux: CVE-2024-33869: Moderate: ghostscript security update (ALSA-2024-6197) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 09/06/2024 Added 09/05/2024 Modified 09/05/2024 Description An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. Solution(s) alma-upgrade-ghostscript alma-upgrade-ghostscript-doc alma-upgrade-ghostscript-tools-dvipdf alma-upgrade-ghostscript-tools-fonts alma-upgrade-ghostscript-tools-printing alma-upgrade-ghostscript-x11 alma-upgrade-libgs alma-upgrade-libgs-devel References https://attackerkb.com/topics/cve-2024-33869 CVE - 2024-33869 https://errata.almalinux.org/9/ALSA-2024-6197.html
-
Alma Linux: CVE-2024-29510: Moderate: ghostscript security update (ALSA-2024-6197)
Alma Linux: CVE-2024-29510: Moderate: ghostscript security update (ALSA-2024-6197) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 09/06/2024 Added 09/05/2024 Modified 09/05/2024 Description Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. Solution(s) alma-upgrade-ghostscript alma-upgrade-ghostscript-doc alma-upgrade-ghostscript-tools-dvipdf alma-upgrade-ghostscript-tools-fonts alma-upgrade-ghostscript-tools-printing alma-upgrade-ghostscript-x11 alma-upgrade-libgs alma-upgrade-libgs-devel References https://attackerkb.com/topics/cve-2024-29510 CVE - 2024-29510 https://errata.almalinux.org/9/ALSA-2024-6197.html
-
Huawei EulerOS: CVE-2024-33870: ghostscript security update
Huawei EulerOS: CVE-2024-33870: ghostscript security update Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 10/09/2024 Added 10/08/2024 Modified 10/08/2024 Description An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. Solution(s) huawei-euleros-2_0_sp10-upgrade-ghostscript huawei-euleros-2_0_sp10-upgrade-ghostscript-help References https://attackerkb.com/topics/cve-2024-33870 CVE - 2024-33870 EulerOS-SA-2024-2436
-
Alma Linux: CVE-2024-34750: Important: tomcat security update (Multiple Advisories)
Alma Linux: CVE-2024-34750: Important: tomcat security update (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 08/23/2024 Added 08/22/2024 Modified 09/18/2024 Description Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue. Solution(s) alma-upgrade-tomcat alma-upgrade-tomcat-admin-webapps alma-upgrade-tomcat-docs-webapp alma-upgrade-tomcat-el-3.0-api alma-upgrade-tomcat-jsp-2.3-api alma-upgrade-tomcat-lib alma-upgrade-tomcat-servlet-4.0-api alma-upgrade-tomcat-webapps References https://attackerkb.com/topics/cve-2024-34750 CVE - 2024-34750 https://errata.almalinux.org/8/ALSA-2024-5694.html https://errata.almalinux.org/9/ALSA-2024-5693.html
-
FreeBSD: VID-8057D198-4D26-11EF-8E64-641C67A117D8 (CVE-2024-39844): znc -- remote code execution vulnerability
FreeBSD: VID-8057D198-4D26-11EF-8E64-641C67A117D8 (CVE-2024-39844): znc -- remote code execution vulnerability Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 07/31/2024 Added 07/29/2024 Modified 07/29/2024 Description In ZNC before 1.9.1, remote code execution can occur in modtcl via a KICK. Solution(s) freebsd-upgrade-package-znc References CVE-2024-39844
-
Debian: CVE-2024-29506: ghostscript -- security update
Debian: CVE-2024-29506: ghostscript -- security update Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 07/03/2024 Created 09/03/2024 Added 09/02/2024 Modified 01/28/2025 Description Artifex Ghostscript before 10.03.0 has a stack-based buffer overflow in the pdfi_apply_filter() function via a long PDF filter name. Solution(s) debian-upgrade-ghostscript References https://attackerkb.com/topics/cve-2024-29506 CVE - 2024-29506 DSA-5760-1
-
Amazon Linux AMI 2: CVE-2024-33869: Security patch for ghostscript (ALAS-2024-2612)
Amazon Linux AMI 2: CVE-2024-33869: Security patch for ghostscript (ALAS-2024-2612) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 08/14/2024 Added 08/14/2024 Modified 08/14/2024 Description An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. Solution(s) amazon-linux-ami-2-upgrade-ghostscript amazon-linux-ami-2-upgrade-ghostscript-cups amazon-linux-ami-2-upgrade-ghostscript-debuginfo amazon-linux-ami-2-upgrade-ghostscript-doc amazon-linux-ami-2-upgrade-ghostscript-gtk amazon-linux-ami-2-upgrade-libgs amazon-linux-ami-2-upgrade-libgs-devel References https://attackerkb.com/topics/cve-2024-33869 AL2/ALAS-2024-2612 CVE - 2024-33869
-
VMware Photon OS: CVE-2024-34750
VMware Photon OS: CVE-2024-34750 Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 07/03/2024 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-34750 CVE - 2024-34750
-
Amazon Linux AMI 2: CVE-2024-33870: Security patch for ghostscript (ALAS-2024-2612)
Amazon Linux AMI 2: CVE-2024-33870: Security patch for ghostscript (ALAS-2024-2612) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 08/14/2024 Added 08/14/2024 Modified 08/14/2024 Description An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. Solution(s) amazon-linux-ami-2-upgrade-ghostscript amazon-linux-ami-2-upgrade-ghostscript-cups amazon-linux-ami-2-upgrade-ghostscript-debuginfo amazon-linux-ami-2-upgrade-ghostscript-doc amazon-linux-ami-2-upgrade-ghostscript-gtk amazon-linux-ami-2-upgrade-libgs amazon-linux-ami-2-upgrade-libgs-devel References https://attackerkb.com/topics/cve-2024-33870 AL2/ALAS-2024-2612 CVE - 2024-33870
-
Amazon Linux AMI 2: CVE-2024-29510: Security patch for ghostscript (ALAS-2024-2597)
Amazon Linux AMI 2: CVE-2024-29510: Security patch for ghostscript (ALAS-2024-2597) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 07/23/2024 Added 07/23/2024 Modified 07/23/2024 Description Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. Solution(s) amazon-linux-ami-2-upgrade-ghostscript amazon-linux-ami-2-upgrade-ghostscript-cups amazon-linux-ami-2-upgrade-ghostscript-debuginfo amazon-linux-ami-2-upgrade-ghostscript-doc amazon-linux-ami-2-upgrade-ghostscript-gtk amazon-linux-ami-2-upgrade-libgs amazon-linux-ami-2-upgrade-libgs-devel References https://attackerkb.com/topics/cve-2024-29510 AL2/ALAS-2024-2597 CVE - 2024-29510
-
Amazon Linux AMI 2: CVE-2024-29511: Security patch for ghostscript (ALAS-2024-2614)
Amazon Linux AMI 2: CVE-2024-29511: Security patch for ghostscript (ALAS-2024-2614) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 08/14/2024 Added 08/14/2024 Modified 08/14/2024 Description Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd. Solution(s) amazon-linux-ami-2-upgrade-ghostscript amazon-linux-ami-2-upgrade-ghostscript-cups amazon-linux-ami-2-upgrade-ghostscript-debuginfo amazon-linux-ami-2-upgrade-ghostscript-doc amazon-linux-ami-2-upgrade-ghostscript-gtk amazon-linux-ami-2-upgrade-libgs amazon-linux-ami-2-upgrade-libgs-devel References https://attackerkb.com/topics/cve-2024-29511 AL2/ALAS-2024-2614 CVE - 2024-29511
-
Amazon Linux AMI 2: CVE-2024-29508: Security patch for ghostscript (ALAS-2024-2614)
Amazon Linux AMI 2: CVE-2024-29508: Security patch for ghostscript (ALAS-2024-2614) Severity 2 CVSS (AV:L/AC:L/Au:S/C:P/I:N/A:N) Published 07/03/2024 Created 08/14/2024 Added 08/14/2024 Modified 01/28/2025 Description Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdf_base_font_alloc. Solution(s) amazon-linux-ami-2-upgrade-ghostscript amazon-linux-ami-2-upgrade-ghostscript-cups amazon-linux-ami-2-upgrade-ghostscript-debuginfo amazon-linux-ami-2-upgrade-ghostscript-doc amazon-linux-ami-2-upgrade-ghostscript-gtk amazon-linux-ami-2-upgrade-libgs amazon-linux-ami-2-upgrade-libgs-devel References https://attackerkb.com/topics/cve-2024-29508 AL2/ALAS-2024-2614 CVE - 2024-29508
-
SUSE: CVE-2024-39844: SUSE Linux Security Advisory
SUSE: CVE-2024-39844: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 07/19/2024 Added 07/18/2024 Modified 07/18/2024 Description In ZNC before 1.9.1, remote code execution can occur in modtcl via a KICK. Solution(s) suse-upgrade-znc suse-upgrade-znc-devel suse-upgrade-znc-lang suse-upgrade-znc-perl suse-upgrade-znc-python3 suse-upgrade-znc-tcl References https://attackerkb.com/topics/cve-2024-39844 CVE - 2024-39844
-
Ubuntu: USN-6897-1 (CVE-2024-29508): Ghostscript vulnerabilities
Ubuntu: USN-6897-1 (CVE-2024-29508): Ghostscript vulnerabilities Severity 2 CVSS (AV:L/AC:L/Au:S/C:P/I:N/A:N) Published 07/03/2024 Created 07/16/2024 Added 07/16/2024 Modified 01/28/2025 Description Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdf_base_font_alloc. Solution(s) ubuntu-upgrade-ghostscript ubuntu-upgrade-libgs10 ubuntu-upgrade-libgs9 References https://attackerkb.com/topics/cve-2024-29508 CVE - 2024-29508 USN-6897-1
-
SUSE: CVE-2023-52168: SUSE Linux Security Advisory
SUSE: CVE-2023-52168: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 07/15/2024 Added 07/15/2024 Modified 07/31/2024 Description The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains a heap-based buffer overflow that allows an attacker to overwrite two bytes at multiple offsets beyond the allocated buffer size: buffer+512*i-2, for i=9, i=10, i=11, etc. Solution(s) suse-upgrade-p7zip suse-upgrade-p7zip-doc suse-upgrade-p7zip-full References https://attackerkb.com/topics/cve-2023-52168 CVE - 2023-52168
-
Alpine Linux: CVE-2024-33869: Vulnerability in Multiple Components
Alpine Linux: CVE-2024-33869: Vulnerability in Multiple Components Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 07/03/2024 Created 08/23/2024 Added 08/22/2024 Modified 10/10/2024 Description An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. Solution(s) alpine-linux-upgrade-ghostscript References https://attackerkb.com/topics/cve-2024-33869 CVE - 2024-33869 https://security.alpinelinux.org/vuln/CVE-2024-33869
-
Alpine Linux: CVE-2024-29510: Vulnerability in Multiple Components
Alpine Linux: CVE-2024-29510: Vulnerability in Multiple Components Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 07/03/2024 Created 08/23/2024 Added 08/22/2024 Modified 10/10/2024 Description Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. Solution(s) alpine-linux-upgrade-ghostscript References https://attackerkb.com/topics/cve-2024-29510 CVE - 2024-29510 https://security.alpinelinux.org/vuln/CVE-2024-29510