Bugzilla – Bug 1225491
VUL-0: CVE-2024-33871: ghostscript,ghostscript-library: ghostscript: OPVP device arbitrary code execution via custom Driver library
Last modified: 2024-07-04 11:20:25 UTC
The "Driver" parameter for the "opvp"/"oprp" device specifies the name of a dynamic library and allows any library to be loaded, potentially leading to arbitrary code execution. References: https://bugs.ghostscript.com/show_bug.cgi?id=707754 https://ghostscript.readthedocs.io/en/gs10.03.1/News.html Upstream patch: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=7145885041bb52cc23964f0aa2aec1b1c82b5908 References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-33871 https://bugzilla.redhat.com/show_bug.cgi?id=2283508
SUSE-SU-2024:2199-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1225491 CVE References: CVE-2024-33871 Maintenance Incident: [SUSE:Maintenance:34460](https://smelt.suse.de/incident/34460/) Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): ghostscript-9.52-23.77.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): ghostscript-9.52-23.77.1 SUSE Linux Enterprise Server 12 SP5 (src): ghostscript-9.52-23.77.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): ghostscript-9.52-23.77.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2198-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1225491 CVE References: CVE-2024-33871 Maintenance Incident: [SUSE:Maintenance:34459](https://smelt.suse.de/incident/34459/) Sources used: openSUSE Leap 15.5 (src): ghostscript-9.52-150000.191.1 openSUSE Leap 15.6 (src): ghostscript-9.52-150000.191.1 Basesystem Module 15-SP5 (src): ghostscript-9.52-150000.191.1 Basesystem Module 15-SP6 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): ghostscript-9.52-150000.191.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): ghostscript-9.52-150000.191.1 SUSE Manager Proxy 4.3 (src): ghostscript-9.52-150000.191.1 SUSE Manager Retail Branch Server 4.3 (src): ghostscript-9.52-150000.191.1 SUSE Manager Server 4.3 (src): ghostscript-9.52-150000.191.1 SUSE Enterprise Storage 7.1 (src): ghostscript-9.52-150000.191.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Fixed for OBS Printing and forwared to openSUSE Factory ----------------------------------------------------------- # osc request accept -m "Security fixes for \ CVE-2024-33869 bsc#1226946 and \ CVE-2023-52722 bsc#1223852 and \ CVE-2024-33870 bsc#1226944 and \ CVE-2024-33871 bsc#1225491 and \ CVE-2024-29510 bsc#1226945 \ for ghostscript and ghostscript-mini" 1184312 ... Forward this submit to it? ([y]/n)y ... New request # 1184313 -----------------------------------------------------------
This is an autogenerated message for OBS integration: This bug (1225491) was mentioned in https://build.opensuse.org/request/show/1184313 Factory / ghostscript