First published: Mon Jun 24 2024(Updated: )
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ghostscript | 9.53.3~dfsg-7+deb11u7 10.0.0~dfsg-11+deb12u4 10.0.0~dfsg-11+deb12u5 10.03.1~dfsg-2 | |
redhat/ghostscript | <10.03.1 | 10.03.1 |
Ghostscript | <10.03.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29510 is classified as a high severity vulnerability due to its potential for memory corruption and exploitation.
To remediate CVE-2024-29510, update Ghostscript to version 10.03.1 or later.
CVE-2024-29510 can lead to memory corruption and allow attackers to bypass the SAFER sandbox.
CVE-2024-29510 affects Ghostscript versions prior to 10.03.1.
CVE-2024-29510 can be exploited through format string injection via the uniprint device, making it a serious security concern.