<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0280</id>
    <title>An update for ghostscript is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2024-11-19 07:40:47"/>
    <updated date="2024-11-19 07:40:47"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-29509" id="CVE-2024-29509" title="CVE-2024-29509 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-29507" id="CVE-2024-29507" title="CVE-2024-29507 Base Score: 5.4 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-29506" id="CVE-2024-29506" title="CVE-2024-29506 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-33869" id="CVE-2024-33869" title="CVE-2024-33869 Base Score: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-29508" id="CVE-2024-29508" title="CVE-2024-29508 Base Score: 3.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-29510" id="CVE-2024-29510" title="CVE-2024-29510 Base Score: 6.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-43115" id="CVE-2023-43115" title="CVE-2023-43115 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-33870" id="CVE-2024-33870" title="CVE-2024-33870 Base Score: 6.3 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-52722" id="CVE-2023-52722" title="CVE-2023-52722 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-29511" id="CVE-2024-29511" title="CVE-2024-29511 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

Artifex Ghostscript before 10.03.0 has a heap-based overflow when PDFPassword (e.g., for runpdf) has a \000 byte in the middle. (CVE-2024-29509)

Artifex Ghostscript before 10.03.0 sometimes has a stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters. (CVE-2024-29507)

Artifex Ghostscript before 10.03.0 has a stack-based buffer overflow in the pdfi_apply_filter() function via a long PDF filter name. (CVE-2024-29506)

An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. (CVE-2024-33869)

Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdf_base_font_alloc. (CVE-2024-29508)

Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. (CVE-2024-29510)

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server). (CVE-2023-43115)

An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. (CVE-2024-33870)

An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard. (CVE-2023-52722)

Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd. (CVE-2024-29511)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="ghostscript">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="ghostscript" version="9.55.0" release="6.r5.hce2">
          <filename>ghostscript-9.55.0-6.r5.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="ghostscript-devel" version="9.55.0" release="6.r5.hce2">
          <filename>ghostscript-devel-9.55.0-6.r5.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="ghostscript-help" version="9.55.0" release="6.r5.hce2">
          <filename>ghostscript-help-9.55.0-6.r5.hce2.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="ghostscript-tools-dvipdf" version="9.55.0" release="6.r5.hce2">
          <filename>ghostscript-tools-dvipdf-9.55.0-6.r5.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="ghostscript" version="9.55.0" release="6.r5.hce2">
          <filename>ghostscript-9.55.0-6.r5.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="ghostscript-devel" version="9.55.0" release="6.r5.hce2">
          <filename>ghostscript-devel-9.55.0-6.r5.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="ghostscript-tools-dvipdf" version="9.55.0" release="6.r5.hce2">
          <filename>ghostscript-tools-dvipdf-9.55.0-6.r5.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
