Format string injection leads to shell command execution (SAFER bypass)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | ghostscript | < any | UNKNOWN |
ubuntu | 20.04 | noarch | ghostscript | < 9.50~dfsg-5ubuntu4.12 | UNKNOWN |
ubuntu | 22.04 | noarch | ghostscript | < 9.55.0~dfsg1-0ubuntu5.7 | UNKNOWN |
ubuntu | 23.10 | noarch | ghostscript | < 10.01.2~dfsg1-0ubuntu2.3 | UNKNOWN |
ubuntu | 24.04 | noarch | ghostscript | < 10.02.1~dfsg1-0ubuntu7.1 | UNKNOWN |
ubuntu | 16.04 | noarch | ghostscript | < any | UNKNOWN |
cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=3b1735085ecef20b29e8db3416ab36de93e86d1f (ghostpdl-10.03.1)
ghostscript.readthedocs.io/en/gs10.03.1/News.html
launchpad.net/bugs/cve/CVE-2024-29510
nvd.nist.gov/vuln/detail/CVE-2024-29510
security-tracker.debian.org/tracker/CVE-2024-29510
ubuntu.com/security/notices/USN-6835-1
www.cve.org/CVERecord?id=CVE-2024-29510