Lucene search

K
mageiaGentoo FoundationMGASA-2023-0290
HistoryOct 19, 2023 - 7:11 p.m.

Updated ghostscript packages fix security vulnerability

2023-10-1919:11:51
Gentoo Foundation
advisories.mageia.org
21
ghostscript
security vulnerability
remote code execution
artifex ghostscript
postscript
unix
vulnerability fix

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.8%

The updated packages fix a security vulnerability: In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. (CVE-2023-43115)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchghostscript< 9.53.3-2.7ghostscript-9.53.3-2.7.mga8
Mageia9noarchghostscript< 10.00.0-6.3ghostscript-10.00.0-6.3.mga9

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.8%