Lucene search

K
slackwareSlackware Linux ProjectSSA-2024-067-01
HistoryMar 07, 2024 - 8:46 p.m.

[slackware-security] ghostscript

2024-03-0720:46:46
Slackware Linux Project
www.slackware.com
25
ghostscript
slackware 15.0
security fix
ocr
permission validation
tesseract
arbitrary code execution

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

23.1%

New ghostscript packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/ghostscript-9.55.0-i586-2_slack15.0.txz: Rebuilt.
Fixes security issues:
A vulnerability was identified in the way Ghostscript/GhostPDL called
tesseract for the OCR devices, which could allow arbitrary code execution.
Thanks to J_W for the heads-up.
Mishandling of permission validation for pipe devices could allow arbitrary
code execution.
For more information, see:
https://vulners.com/cve/CVE-2023-36664
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/ghostscript-9.55.0-i586-2_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/ghostscript-9.55.0-x86_64-2_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/ghostscript-10.03.0-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/ghostscript-10.03.0-x86_64-1.txz

MD5 signatures:

Slackware 15.0 package:
533102bd76c090b72680cf466386a458 ghostscript-9.55.0-i586-2_slack15.0.txz

Slackware x86_64 15.0 package:
b1ee06e28fd81b1d04a3b62a5a953886 ghostscript-9.55.0-x86_64-2_slack15.0.txz

Slackware -current package:
a40a1e316f17c75b753c8d9e3a59dff2 ap/ghostscript-10.03.0-i586-1.txz

Slackware x86_64 -current package:
799f7a0f77d8a2e7624f8b4a97942d45 ap/ghostscript-10.03.0-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg ghostscript-9.55.0-i586-2_slack15.0.txz

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

23.1%