Improper Input Validation Affecting gimp:flatpak/ghostscript package, versions *
Threat Intelligence
EPSS
0.72% (82nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-GIMP-7369712
- published 25 Jun 2024
- disclosed 16 May 2024
Introduced: 16 May 2024
CVE-2024-29510 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8
gimp:flatpak/ghostscript
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gimp:flatpak/ghostscript
package and not the gimp:flatpak/ghostscript
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
References
- https://access.redhat.com/security/cve/CVE-2024-29510
- https://www.vicarius.io/vsociety/posts/critical-vulnerability-in-ghostscript-cve-2024-29510
- https://bugs.ghostscript.com/show_bug.cgi?id=707662
- https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/
- https://www.openwall.com/lists/oss-security/2024/07/03/7
CVSS Scores
version 3.1