Advisory Published

USN-6835-1: Ghostscript vulnerabilities

First published: Mon Jun 17 2024(Updated: )

It was discovered that Ghostscript did not properly restrict eexec seeds to those specified by the Type 1 Font Format standard when SAFER mode is used. An attacker could use this issue to bypass SAFER restrictions and cause unspecified impact. (CVE-2023-52722) This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. Thomas Rinsma discovered that Ghostscript did not prevent changes to uniprint device argument strings after SAFER is activated, resulting in a format-string vulnerability. An attacker could possibly use this to execute arbitrary code. (CVE-2024-29510) Zdenek Hutyra discovered that Ghostscript did not properly perform path reduction when validating paths. An attacker could use this to access file locations outside of those allowed by SAFER policy and possibly execute arbitrary code. (CVE-2024-33869) Zdenek Hutyra discovered that Ghostscript did not properly check arguments when reducing paths. An attacker could use this to access file locations outside of those allowed by SAFER policy. (CVE-2024-33870) Zdenek Hutyra discovered that the "Driver" parameter for Ghostscript's "opvp"/"oprp" device allowed specifying the name of an arbitrary dynamic library to load. An attacker could use this to execute arbitrary code. (CVE-2024-33871)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/ghostscript<10.02.1~dfsg1-0ubuntu7.1
10.02.1~dfsg1-0ubuntu7.1
Ubuntu=24.04
All of
ubuntu/ghostscript-doc<10.02.1~dfsg1-0ubuntu7.1
10.02.1~dfsg1-0ubuntu7.1
Ubuntu=24.04
All of
ubuntu/libgs-common<10.02.1~dfsg1-0ubuntu7.1
10.02.1~dfsg1-0ubuntu7.1
Ubuntu=24.04
All of
ubuntu/libgs-dev<10.02.1~dfsg1-0ubuntu7.1
10.02.1~dfsg1-0ubuntu7.1
Ubuntu=24.04
All of
ubuntu/libgs10<10.02.1~dfsg1-0ubuntu7.1
10.02.1~dfsg1-0ubuntu7.1
Ubuntu=24.04
All of
ubuntu/libgs10-common<10.02.1~dfsg1-0ubuntu7.1
10.02.1~dfsg1-0ubuntu7.1
Ubuntu=24.04
All of
ubuntu/ghostscript<10.01.2~dfsg1-0ubuntu2.3
10.01.2~dfsg1-0ubuntu2.3
Ubuntu=23.10
All of
ubuntu/ghostscript-doc<10.01.2~dfsg1-0ubuntu2.3
10.01.2~dfsg1-0ubuntu2.3
Ubuntu=23.10
All of
ubuntu/ghostscript-x<10.01.2~dfsg1-0ubuntu2.3
10.01.2~dfsg1-0ubuntu2.3
Ubuntu=23.10
All of
ubuntu/libgs-common<10.01.2~dfsg1-0ubuntu2.3
10.01.2~dfsg1-0ubuntu2.3
Ubuntu=23.10
All of
ubuntu/libgs-dev<10.01.2~dfsg1-0ubuntu2.3
10.01.2~dfsg1-0ubuntu2.3
Ubuntu=23.10
All of
ubuntu/libgs10<10.01.2~dfsg1-0ubuntu2.3
10.01.2~dfsg1-0ubuntu2.3
Ubuntu=23.10
All of
ubuntu/libgs10-common<10.01.2~dfsg1-0ubuntu2.3
10.01.2~dfsg1-0ubuntu2.3
Ubuntu=23.10
All of
ubuntu/libgs9-common<10.01.2~dfsg1-0ubuntu2.3
10.01.2~dfsg1-0ubuntu2.3
Ubuntu=23.10
All of
ubuntu/ghostscript<9.55.0~dfsg1-0ubuntu5.7
9.55.0~dfsg1-0ubuntu5.7
Ubuntu=22.04
All of
ubuntu/ghostscript-doc<9.55.0~dfsg1-0ubuntu5.7
9.55.0~dfsg1-0ubuntu5.7
Ubuntu=22.04
All of
ubuntu/ghostscript-x<9.55.0~dfsg1-0ubuntu5.7
9.55.0~dfsg1-0ubuntu5.7
Ubuntu=22.04
All of
ubuntu/libgs-dev<9.55.0~dfsg1-0ubuntu5.7
9.55.0~dfsg1-0ubuntu5.7
Ubuntu=22.04
All of
ubuntu/libgs9<9.55.0~dfsg1-0ubuntu5.7
9.55.0~dfsg1-0ubuntu5.7
Ubuntu=22.04
All of
ubuntu/libgs9-common<9.55.0~dfsg1-0ubuntu5.7
9.55.0~dfsg1-0ubuntu5.7
Ubuntu=22.04
All of
ubuntu/ghostscript<9.50~dfsg-5ubuntu4.12
9.50~dfsg-5ubuntu4.12
Ubuntu=20.04
All of
ubuntu/ghostscript-doc<9.50~dfsg-5ubuntu4.12
9.50~dfsg-5ubuntu4.12
Ubuntu=20.04
All of
ubuntu/ghostscript-x<9.50~dfsg-5ubuntu4.12
9.50~dfsg-5ubuntu4.12
Ubuntu=20.04
All of
ubuntu/libgs-dev<9.50~dfsg-5ubuntu4.12
9.50~dfsg-5ubuntu4.12
Ubuntu=20.04
All of
ubuntu/libgs9<9.50~dfsg-5ubuntu4.12
9.50~dfsg-5ubuntu4.12
Ubuntu=20.04
All of
ubuntu/libgs9-common<9.50~dfsg-5ubuntu4.12
9.50~dfsg-5ubuntu4.12
Ubuntu=20.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of USN-6835-1?

    The severity of USN-6835-1 is considered important due to the potential risk of bypassing SAFER mode restrictions in Ghostscript.

  • How do I fix USN-6835-1?

    To fix USN-6835-1, upgrade Ghostscript to version 10.02.1~dfsg1-0ubuntu7.1 or higher on affected Ubuntu systems.

  • Which versions of Ghostscript are affected by USN-6835-1?

    Ghostscript versions prior to 10.02.1~dfsg1-0ubuntu7.1 on Ubuntu 24.04 and earlier are affected by USN-6835-1.

  • What impact could USN-6835-1 have on my system?

    USN-6835-1 could allow an attacker to bypass SAFER restrictions, potentially leading to unspecified impacts on the system.

  • Does USN-6835-1 affect all Ubuntu versions?

    No, USN-6835-1 specifically affects Ubuntu versions 20.04, 22.04, 23.10, and 24.04 with certain Ghostscript packages.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203